Encryption

GATE can also be used for information encryption and decryption. Just like authenticating each user, we can use GATE to authenticate each piece of information. We can mix other information elements [ e.g. characters, bits ] with the information elements in your massage and get the encrypted message. Then attach each information element in the encrypted massage with a tokens table and some key tokens, if an information element is from your original message, then the tokens table and the key tokens attached to that information element will authenticate each other, otherwise if an information element is a filler information element, then the tokens table and the key tokens attached to that information element will not authenticate each other, so at the receiver side, we can use the same passcode that the sender used to decrypt the message and get the original information.

GATE algorithm can generate tokens table and key tokens according to a given passcode, and use them to encrypt data. This is different from all other encryption algorithms.


GATE does not use prime numbers to encrypt information, it uses the patented GATE authentication system to authenticate each piece of information element. During the encryption process, original information is broken down into multiple information elements [ characters, bytes or bits ], then mixed in with other filler [ fake ] information elements, each information element is attached with a GATE tokens table [ equivalent to a lock ] and some key tokens [ equivalent to a key ].

For each original information element a valid tokens table [ lock ] and a set of key tokens [ correct key ] are attached to it, for each filler [ fake ] information element automatically generated by the GATE encryption algorithm, a tokens table [ lock ] and a set of invalid key tokens [ wrong key ] are attached to it, whether a tokens table [ lock ] and the set of key tokens [ key ] attached to it can validate each other depends on the passcode, so if you have the right passcode, you can tell which information elements are part of the original information, and which information elements are invalid filler elements and should be get rid of during decryption to get the original information.

Therefore, even when faced with a fast quantum computer, if you don't know the passcode which is used to encode the original message, you will just get the wrong answers faster, and there are multiple combinations of possible wrong answers [ if you used a wrong passcode, you just open some wrong locks which contain some wrong information elements ], and none of them is telling you which one among them is part of the original correct information.

The GATE encryption/decryption system has the following characteristics :

[1] Encrypted data size adjustable.

Depending on how fine you chop up the information, the finer you chop up the original message, the larger the encrypted message will become and more secure it becomes.

For instance if you use word as an information element, then the following message will have 3 information elements : How are you.

If you use character as information element, then the above message will have 12 information elements : H o w _ a r e _ y o u .

Or you can use byte or even bits as information elements, if so, the encrypted file will be larger and more secure.

[2] Use GATE passcode, not prime numbers to encrypt data.

Since GATE encryption uses GATE authentication as basis to encrypt message, only when you know the passcode that is used to encrypt the original massage, will you get back the original information after decryption using the same passcode, otherwise, if you use a different [ wrong ] passcode to decrypt the encrypted message, you will get a different [ wrong ] message from the original information. With a fast quantum computer, you just get the wrong message faster.

[3] Extremely large size of encrypted file automatically deter most run-of-the-mill hackers.

With GATE encryption, since the encrypted message will grow many [ at least 350 ] times larger, it will become very hard for a potential hacker to attempt different possible combinations of passcodes to try to get to the right answer, it takes a lot of space and time to encrypt/decrypt messages. Which means, if a message is encrypted with a giant powerful computer, then the encrypted message will be too large for a run-of-the-mill hacker to even try to crack it, because the information is simply too large to handle, way beyond their capability. This will significantly reduce the potential threat. For example, if your original file size is 100 MB, after the GATE encryption, the encrypted file can easily be as large as 700 GB [ 7,000 times larger ] if you set inflate index to 5. The inflate index range from 1 to 999 which can be adjusted according to your needs [ I choose 999 in my app because it's WAY LARGE enough for my PC, but this index can be as large as your computer can handle ], no upper limit.

[4] Even with powerful computers, it's hard to determine the original order of the chopped up large data chunks before decryption.

Since GATE encryption will result in a large encrypted file, it will then be chopped up and named in seemingly random order [ yet the GATE system knows how to put them back in the correct order ], so even if those chopped up encrypted files are in hackers' hands, it will be hard to even put them [ like pieces of puzzles ] back in the correct order before trying to decrypt them.

Quantum computing is an emerging technology, IBM, Intel, Microsoft, Google, D-Wave and Honeywell are all heavily involved in the Quantum computer development. Nowadays quantum computer resistant encryption is a hot topic : NIST Announced Four Quantum-Resistant Cryptographic Algorithms, but one of them is already cracked in a few months. Meanwhile Chinese Scientists Propose New Way to Break Encryption.

Soon current encryption methods will be insufficient to keep massages safe, we need to look for new ways to encrypt data. GATE encryption is an attempt in that direction. I welcome experts in this field to take a close look and play a cat and mouse game of encrypting and decrypting, see who can do a better job either at encrypting data or cracking the encryption.

See detailed description here : How_GATE_Encryption_Works.rtf                             Sample apps are also available.


Donate For Cybersecurity !