TABLE OF CONTENTS

Page numbers apply to the paperback edition.

Back to Marpx.com

Cover page    1

Intellectual property ownership    2

Table of contents    3

Executive summary    7

What's new in the 2nd Edition?    9

CHAPTER 1  Simplicity of the design    10

1.1 Goal -- Simplicity for efficiency
1.2 Goal -- Simplicity for quicker acceptance
1.3 Caution -- High school arithmetic ahead
1.4 Quick review -- Base 10, 2, and 16 counting
1.5 Quick review -- Bits and bytes
1.6 Quick review -- Exponents
1.7 Quick review -- Permutations
1.8 Quick review -- Factorials
1.9 What's NOT in the design?

CHAPTER 2  Elements of the design    18

2.1 Software implementation
2.2 Bit basis B, a count of computer bits
2.3 Powers of 2
2.4 Permutations and factorials
2.5 Key -- A collection of permutations
2.6 Pseudo-key -- Alphanumeric characters
2.7 Key length N -- Number of segments in a key
2.8 SET -- Shared Exchange Tool
2.9 PET -- Private Exchange Tool
2.10 Random byte file
2.11 The usual suspects -- Devices, people, ...
2.12 Action -- Bit swapping
2.13 Action -- Bit scattering

CHAPTER 3  Scalability for post-quantum success    29

3.1 Intermediate design goal -- Entropy
3.2 Hackers and patterns
3.3 Simplicity revisited
3.4 Two small parameters
3.5 One giant design goal -- Scalability
3.6 Size of a key
3.7 Count of unique potential keys
3.8 Brute force attack
3.9 Scalability -- Bring on your qubits

CHAPTER 4  No keys, please    38

4.1 Symmetric key management -- A pain
4.2 Symmetric key management -- A solution
4.3 Solution component -- Personal ID code
4.4 Solution component -- Roster
4.5 Solution component -- Random bytes file
4.6 Solution component -- Time based keys
4.7 Solution component -- Date stamp
4.8 The user experience

CHAPTER 5 The challenge    48

5.1 Evaluate the design
5.2 Ground rules for the challenge
5.3 Resource -- Publications
5.4 Resource -- MarpX Privacy software
5.5 Resource -- Online helps
5.6 Resource -- Online learning
5.7 Resource -- Extreme Encryption software
5.8 Resource -- Source code project
5.9 Is even stronger encryption needed?

CHAPTER 6 Possible implementations    55

6.1 Lawyers, accountants, doctors, ...
6.2 Email and communication media
6.3 Cloud storage
6.4 Other applications?

CHAPTER 7 Social impact    59

7.1 Privacy rights versus collective security
7.2 Citizens of totalitarian regimes
7.3 Cybersecurity and national security personnel
7.4 Government units suffering cyber thefts / cyber invasions
7.5 Businesses with proprietary information
7.6 People who are fed up with constant invasions of their privacy
7.7 People who care about the dignity of the human person
7.8 Hackers
7.9 Mark Zuckerberg
7.10 Xi Jinping
7.11 The U.S. Supreme Court

EPILOGUE    71

APPENDIX A:  Entropy follows from encryption    72

A.1 Entropy -- A technical how-to
A.2 Example of encryption -- Overview
A.3 Unpack a key
A.4 Pre-step -- Optional compression
A.5 Innovation -- N iterations of swap and scatter
A.6 Swap bits, guided by some random permutation
A.7 Scatter bits, guided by a different random permutation
A.8 Post-step -- Add date and time stamp
A.9 Post-step -- Optional base 64 text wrap

APPENDIX B:  Order follows from decryption    82

B.1 Example of decryption -- Overview
B.2 Remove optional text wrap
B.3 Invert odd number permutations
B.4 Odd number rounds of bit substitution
B.5 Even number rounds -- Recoup bits from their dispersed positions
B.6 Remove date and time stamp
B.7 Decompress if necessary

Back to Marpx.com