20150413

5

eN5 encryption (the name refers to the substitution value of the letter N) is the standard text encryption mechanism utilised by RAVEN. It uses a 30-bit substitution code translated into a non-standard base carrying an additional chromatic data layer. Further encryption is generally applied to the resulting code using an assymetric peer key process.

The 30 bits are:
a (8)
b (chroma O)
c (chroma R)
d (chroma I)
e (chroma G)
f (9)
g (2)
h (6)
i (17)
j (7)
k (18)
l (1)
m (chroma B)
n (5)
o (chroma Y)
p (3)
q (Ø)
r (13)
s (X)
t (19)
u (4)
v (15)
w (14)
x (O)
y (chroma V)
z (16)
case indicator ($) 
spacer (chroma K)
alt toggle (§)
clear (chroma W)

The precise details of the non-standard base formation are not made public but can to a large extent be deduced. The table below shows a typical encryption into a chromatic figure (colouring is illustrative and approximate; chromatic information is in reality encoded as a separate number string). Where appropriate, words are traditionally broken into units of five characters or less.

The
quick
brown
fox
jumps
over
the
lazy
dog
$the
quick
brown
fox
jumps
over
the
lazy
dog
72249 GK124962 R 16KO 11 Y 109K9 Y 18K69 B 35KY 13 G 11K159 GK1319 VKI Y 2
7224912496216111099186935131115913192
SXFHeQULJcKbRoWNFoXJUmPSoVeRTHeKZydoG

Superficially, the encryption is marginally lossy. The final line of the above table shows the result of a standard decryption of the chromatic figure (chromatic deductions are presented in lower case). Such aberrations are a deliberate layer of the encryption, and a simple demonstration of the process of loss can be seen with the example "lazy", where the letters L and A (encoded as 1 and 8) are reduced to K (encoded as 18). A reversal of this principle is found in "quick", where I (encoded as 17) is expanded to L and J (1 and 7). It should be understood that the precise mechanism by which such characters become expanded or reduced is governed by certain rules, and that not all such transformations are as straightforward. The exact process is governed by the base translation, but information about the input is required to generate an accurate output. To this end, alt toggles may be employed to convey further data packets for disambiguation, but in some eN5 encryptions these are deliberately withheld or may be sent separately. Likewise, the chromatic layer of the code may be separated from the main body. Without the chromatic layer, the permutations for decryption are immense. A popular but extremely basic encryption format uses a two-colour layer (chroma K and chroma W); such a decryption of the above figure would read SXFH QULJK RWN FX JUPS VR TH KZ G. Other variants of the two-colour model exchange word spacing for uniform character periods to further obscure the original text.

Assymetric peer key encryption of eN5 generally takes the form of a mathematical translation of one or both of the translation figure and/or the chromatic layer. eN5 alone is not an appropriate format for the transmission of sensitive data, unless used in conjunction with some form of assymetric cryptography.

No comments:

Post a Comment