fumes
fumes
  • 61
  • 3 776

วีดีโอ

Number Theoretical Cellular Automata
มุมมอง 339 ชั่วโมงที่ผ่านมา
fsx = sfx where f is the application of the rule and s is a circular shift by one bit
Probabilistic Encryption Via Xor-Product Of Cellular Automata
มุมมอง 199 ชั่วโมงที่ผ่านมา
github.com/k0ntinuum/xor_pr
XORing Cellular Automata
มุมมอง 612 ชั่วโมงที่ผ่านมา
XORing Cellular Automata
Twin CA Stream Cipher (Detail)
มุมมอง 1612 ชั่วโมงที่ผ่านมา
Twin CA Stream Cipher (Detail)
Stream Cipher Using Twin Cellular Automata
มุมมอง 1012 ชั่วโมงที่ผ่านมา
github.com/k0ntinuum/twin_stream code for this vid mostly in stream_demo.c
Factoring Cellular Automata ( Public Key System ?)
มุมมอง 3014 ชั่วโมงที่ผ่านมา
Factoring Cellular Automata ( Public Key System ?)
Deniable Encryption With Rotating Cellular Automata
มุมมอง 2316 ชั่วโมงที่ผ่านมา
github.com/k0ntinuum/den_enc
Rotating Cellular Automata As Functions On Integers
มุมมอง 416 ชั่วโมงที่ผ่านมา
A simple idea, but also an easy way to generate complicated pseudo-random functions from 2^64 to 2^64. Note that I actually used a "rotating" CA in this example. A rotating CA involves circular shifting the rule by one place after each cell in a particular role is processed. Finally, this system uses a battery of rules in this way, since that twist helped the related cryptosystem work.
LFSR (3)
มุมมอง 6419 ชั่วโมงที่ผ่านมา
LFSR (3)
LFSR (2)
มุมมอง 319 ชั่วโมงที่ผ่านมา
LFSR (2)
LFSR (1)
มุมมอง 1419 ชั่วโมงที่ผ่านมา
LFSR (1)
Random Circuits For Cryptography
มุมมอง 814 วันที่ผ่านมา
Random Circuits For Cryptography
Rotating Cellular Automata Probabilistic Cryptosystem
มุมมอง 11621 วันที่ผ่านมา
source code here : github.com/k0ntinuum/rot_ca_64
Cellular Automata Stochastic Cipher
มุมมอง 48321 วันที่ผ่านมา
Cellular Automata Stochastic Cipher
O|
มุมมอง 4221 วันที่ผ่านมา
O|
Cellular Automata Probabilistic / Homophonic Encryption
มุมมอง 49221 วันที่ผ่านมา
Cellular Automata Probabilistic / Homophonic Encryption
Fractal Stochastic "Glass" Symmetric Cryptosystem [ Octal Presentation ]
มุมมอง 2521 วันที่ผ่านมา
Fractal Stochastic "Glass" Symmetric Cryptosystem [ Octal Presentation ]
Fractal Stochastic "Glass" Cryptosystem
มุมมอง 30121 วันที่ผ่านมา
Fractal Stochastic "Glass" Cryptosystem
"Hypercube" Boolean Function Symmetric Cipher
มุมมอง 147หลายเดือนก่อน
"Hypercube" Boolean Function Symmetric Cipher
Tesseract Fractal Reversible Cellular Automata Cipher
มุมมอง 590หลายเดือนก่อน
Tesseract Fractal Reversible Cellular Automata Cipher
3D Reversible Cellular Automaton Symmetric Encryption ( 8 x 8 x 8 )
มุมมอง 137หลายเดือนก่อน
3D Reversible Cellular Automaton Symmetric Encryption ( 8 x 8 x 8 )
3D Reversible Cellular Automaton Symmetric Cipher
มุมมอง 16หลายเดือนก่อน
3D Reversible Cellular Automaton Symmetric Cipher
Reversible Ternary Cellular Automaton Symmetric Cipher
มุมมอง 74หลายเดือนก่อน
Reversible Ternary Cellular Automaton Symmetric Cipher
Cryptosaurus ( Reversible Cellular Automata )
มุมมอง 16หลายเดือนก่อน
Cryptosaurus ( Reversible Cellular Automata )
Reversible Cellular Automata Symmetric Cryptosystem
มุมมอง 37หลายเดือนก่อน
Reversible Cellular Automata Symmetric Cryptosystem
flag 3
มุมมอง 9หลายเดือนก่อน
flag 3
flag 2
มุมมอง 3หลายเดือนก่อน
flag 2
fort 1
มุมมอง 4หลายเดือนก่อน
fort 1
flag 1
มุมมอง 6หลายเดือนก่อน
flag 1

ความคิดเห็น

  • @f_u_m_a_r_o
    @f_u_m_a_r_o 4 วันที่ผ่านมา

    I should clarify that c is used as the seed for BOTH (not shown) ordinary cellular automata. So I would decode c by feeding it to both automata (one with rule f and the other with rule g). After E rounds of "processing," I would XOR the last rows of each "normal" automaton. Finally I would look at the evenly spaced bits to recover the plaintext p. In this vid, I show a live computation of "xor product" pseudo-automaton. This is not necessary for the recovery of the plaintext. It is added only to better illustrate the concept. It suffices, if you just want the plaintext, to do a single XOR-ing of the last rows of the f-CA and the g-CA.

  • @LindaSpreitzer-x1o
    @LindaSpreitzer-x1o 6 วันที่ผ่านมา

    Thanks for sharing such valuable information! A bit off-topic, but I wanted to ask: I have a SafePal wallet with USDT, and I have the seed phrase. (mistake turkey blossom warfare blade until bachelor fall squeeze today flee guitar). How can I transfer them to Binance?

  • @kuhascoat
    @kuhascoat 16 วันที่ผ่านมา

    I wonder if you can use this system of logic to graph the Logistical Map

    • @f_u_m_a_r_o
      @f_u_m_a_r_o 15 วันที่ผ่านมา

      I think so. At least a big enough version should work. Since floating point numbers are ultimately discrete bits being switched on and off.

  • @gownerjones
    @gownerjones 16 วันที่ผ่านมา

    Do you and/or only the last two rows together or all the rows together?

    • @f_u_m_a_r_o
      @f_u_m_a_r_o 16 วันที่ผ่านมา

      The and-or is applied only as the state is updated, so only two rows are involved. In the code, I use use a 64-bit integer s and run it through one of two functions parameterized by the "gate code."

  • @Jubinemoilygerbioe
    @Jubinemoilygerbioe 16 วันที่ผ่านมา

    Thanks for sharing! Just a quick off-topic question: I have TRC20 USDT in my OKX wallet and I have the recovery phrase: (pride pole obtain together second when future mask review nature potato bulb). What is the best way to transfer them to Binance?

  • @hex-automata
    @hex-automata 17 วันที่ผ่านมา

    Wonder how the result would look if you include some NAND, NOR, and XOR gates?

    • @f_u_m_a_r_o
      @f_u_m_a_r_o 17 วันที่ผ่านมา

      I actually have experimented with XOR gates, and I thought of building the circuit entirely using NANDS. My primary constraint is that I want to use unsigned 64 bit integers to represent a layer of little gates. I started with XOR gates (1 is negation and 0 lets the input bit pass thru) and the AND-OR gates shown above (where 0 applies an OR to the 2 associated input bits while 1 applies an AND.) So I guess that NOR and NAND are implicit in that setup, because the XOR gates and AND-OR gates alternate. What inspires me is the theory of circuit complexity. As we add layers we add to the number of functions from 64 bits to 64 bits that might be computed by a random key (selection of gate bits.) If we interpret the input bits and output bits as floating point numbers, we are generating random functions on real-ish number. Anyway, the idea above could be presented via Raylib in pixels, with much more detail and more complex circuits.

    • @Huxya
      @Huxya 15 วันที่ผ่านมา

      Emerging Complexity requires balance, or being close to it, AND on a 50:50 infinite binary input here balanced, because for any 1 to "survive" to the next iteration it has to has another one next to it, right or left, and probability of it is also 50:50. same ill be in XOR, but then you won't see grouping of 1s, it will look more like a white noise

  • @SVGPRO
    @SVGPRO 19 วันที่ผ่านมา

    The neat thing about CASC is that it combines the predictable patterns of cellular automata with randomness, making it both structured and unpredictable - which is exactly what you want in encryption.

  • @migleczl
    @migleczl 20 วันที่ผ่านมา

    wtf is this

    • @paulb4967
      @paulb4967 20 วันที่ผ่านมา

      its allice and bob bro.

  • @benjaminbaleilevuka6127
    @benjaminbaleilevuka6127 20 วันที่ผ่านมา

    Nice

  • @zackbrown1865
    @zackbrown1865 22 วันที่ผ่านมา

    is anybody useing this?

    • @f_u_m_a_r_o
      @f_u_m_a_r_o 22 วันที่ผ่านมา

      Not that I know of. I think mostly people use the same few systems, mostly to encrypt files. Like AES. Not sure what kind of things spies are doing these days, though I'm reading up on the history of cryptography.

    • @zackbrown1865
      @zackbrown1865 21 วันที่ผ่านมา

      @@f_u_m_a_r_o do you think its crackable without a quantum computer

  • @Marksman560
    @Marksman560 22 วันที่ผ่านมา

    I would find this very impressive, if only I understood hehehe 😅

    • @f_u_m_a_r_o
      @f_u_m_a_r_o 22 วันที่ผ่านมา

      I think this system only makes sense if you've looked into cellular automata, such as Wolfram's Rule 30. Basically it's a 1D version of something like Conway's Game of Life.

  • @adamz8314
    @adamz8314 22 วันที่ผ่านมา

    can we prove existing of supernatural being using cellular automata?

    • @f_u_m_a_r_o
      @f_u_m_a_r_o 22 วันที่ผ่านมา

      IMO, probably not, but I do think philosophy of math and logic is connected in surprising ways to theology. Godel thought quite a bit about math and God and logic.

  • @VanAmbra
    @VanAmbra 23 วันที่ผ่านมา

    Appreciate the detailed breakdown! I need some advice: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How can I transfer them to Binance?

  • @mikeymikey2662
    @mikeymikey2662 หลายเดือนก่อน

    Okay so i am no cryptography expert, I have just gotten into this stuff reading Moti yung papers. IDK how I end up watching these honestly. But in you Reversible Cellular Automata Symmetric Cryptosystem video you mention the ability to encrypt monochrome images. I think you could use the above system scale to encrypt colored images as well. Let me try my best to explain. Color is represented by 3 channels: Red, Green, and Blue(RGB). Each channel could be treated as its own 16x16 grid of bits similar to how you used how you mentioned handling monochrome imaging. Then apply a similar row-column permutation or 4-D cellular automata encryption system to each 16x16 channel independently. After encryption combine everything into a single now scrambled image. Each pixel would then contain three, 256-bit channels-making encryption and decrpytion straight forward. Th diffusion properies of your system ensure that data in each channel is scrambled while maintaining basic image properties(size). And by treating each channel as its own grid as in your cryptosystem as said, this should work for color.

    • @f_u_m_a_r_o
      @f_u_m_a_r_o หลายเดือนก่อน

      That makes sense to me. You basically choose some number of bits for the specification of a single color (256 being a natural choice) and include enough bits for 3 color values per pixel. The only problem would be the computational expense as images get large. But on modern computers that should not be a big deal. At some point I may even code it up just to see a picture scrambled and then unscrambled. I looked up Moti. Interesting fellow. As I mentioned elsewhere, My own crypto learning is just a couple of independent studies while a math student, so I am far from an expert. But I'm a fan of the stuff and I like coming up with systems. Lately I started to think about Public Key cryptography. Very challenging. Much harder IMO than symmetric cryptography.

    • @mikeymikey2662
      @mikeymikey2662 23 วันที่ผ่านมา

      ​@@f_u_m_a_r_o Such a system has some practical usage. In criminal investigations, specifically those relating to CSAM, this form of encryption could be used to maintain integrity of offensive and illegal materials. Using non symmetric public key architecture, the same database could be used to store both the data needed to continue criminal investigations and a honeypot to monitor malicious actors attempting to access the materials. Inspired by some of Moti's work, the system could even be built in such a way to appear symmetric to unauthorized users but instead is a tool to monitor traffic. I know most of this is just for fun, but I think you have a highly purposeful and useful system here.

    • @mikeymikey2662
      @mikeymikey2662 3 วันที่ผ่านมา

      @@f_u_m_a_r_o Ive been meaning to reply to this but never did. There is novel use in the application of such encryption. I would like to work for HSI, and one of the horrible parts of the job is handling CSAM(child sexual abuse material) Such an image encryption system could allow images to sit in a public database and only those with specific keys could decrypt images correctly. Asymmetric encryption would also allow specific keys access to materials to be monitored for threat actors. 2-in-1 system for public immutable evidence protection and a means to catch people who should not be attempting access. I think you have a genius idea.

  • @hex-automata
    @hex-automata หลายเดือนก่อน

    I have a rudimentary example of using a cellular automaton to encrypt a message. I wrote the program, mainly for fun. But it might have applications. I think Wolfram and others have already speculated about this. th-cam.com/video/NpojqQxZCrU/w-d-xo.htmlsi=g_Gs5bTp1O_u1zFe

    • @f_u_m_a_r_o
      @f_u_m_a_r_o หลายเดือนก่อน

      I checked it out. Very cool. I've been wrestling with using CA, and I think the periodicity is a good way to get an inversion or descrambling. I'm guessing it's hard to find rules that invert, since usually information is thrown away in any kind of neighborhood rule. Thanks for sharing !

    • @hex-automata
      @hex-automata หลายเดือนก่อน

      @@f_u_m_a_r_o I hear that reversibility is important for energy efficiency. And also that calculations relying on quantum mechanical effects must be reversible. But I do not yet understand how to implement reversible CA on my platform. It should be possible with the very rich rule-space (which includes access to the previous generation's states configuration), but probably none of my CA so far are reversible, as evident from the observation of multiple seeds producing the same pattern upon iteration.

    • @f_u_m_a_r_o
      @f_u_m_a_r_o หลายเดือนก่อน

      @@hex-automata My understanding is that, indeed, Wolfram style CAs are not reversible, which makes sense, because they map 3 bits to 1 bit, so you are losing information. But I thought maybe you found a periodic cellular automata. Not sure I understood you correctly. But assuming one has a periodic CA, then one has found a functional inverse. Let x be a set of bits. Let f_n(x) be the application of the fule f to the seed x performed n times in a row. Then if you can find some m such that f_m(x) = x, you can decompose f into functions g and g_inverse. If I understood correctly, you encoded "hello" with such a periodic function. That appeals to me because I am very interested in using Wolfram style CAs in crypto. The ones used above are not Wolfram style, because they map n bits to n bits. I have thought of some systems that use Wolfram style CAs. And they work. But they don't work by inverting the update rule. But theoretically there are rules out there (which maybe you've found in the hex situation) that have some fixed period. Ideally they'd need the same fixed period for every input x. One could search possible rules for this periodicity, but it would be computationally expensive. You might be stuck with messages of maybe 16 bits.

  • @o1-preview
    @o1-preview หลายเดือนก่อน

    people bitch too much, this is really cool man

  • @mikeymikey2662
    @mikeymikey2662 หลายเดือนก่อน

    would be interesting to see something like this for security in file encryption. where revealing a decoy key satisfies adversaries by providing information via kleptographic side channel.

    • @f_u_m_a_r_o
      @f_u_m_a_r_o หลายเดือนก่อน

      I think other systems do already have that feature. But I liked finding another approach to the same clever idea. In larger versions of this system, you could encode an unknown number of plaintext messages in the same ciphertext. So you could potentially have 2 or 3 "fake decryptions" available, which you might choose from depending who was forcing you to decrypt your file. Basically the only constraint is memory. But for small files (like text files) this wouldn't be a problem at all. You are basically increasing the file size by a factor of n (so only a linear increase).

  • @exponentialnegative1
    @exponentialnegative1 หลายเดือนก่อน

    Could you make it look like the hacking scene from swordfish? Jokes aside, kudos!

  • @thefreemarketdev
    @thefreemarketdev หลายเดือนก่อน

    if only it was possible to predict and guess the timesteps correctly then it would only be 8 x 8 bit combinations to brute force.

  • @f_u_m_a_r_o
    @f_u_m_a_r_o หลายเดือนก่อน

    To use this to encrypt a message, you'd just start with the message. Then you advance the CA by 256 time steps. The resulting state is the encrypted message. If you have the key, you can undo the encryption and recover the original message. You decrypt basically by running the CA update rule in reverse. So the CA is general system with parameters, and the choice of those parameters is the key.

    • @rumplstiltztinkerstein
      @rumplstiltztinkerstein หลายเดือนก่อน

      Very interesting. I was thinking on "how can we make the encryption less expensive than the decryption". But then I realized that we are picking arbitrary spots from this matrix. Those voluntary spots would act like the "private key". We then advance time for a given large enough "N". Since the spots picked and time skipped "N" are not known, it increases the computation required to decrypt by an exponential lot. To advance the time on the Automata requires as input all the elements of the current time. So it can't be parallelized that easily. Meaning a quantum computer may have a hard time computing something with large enough parameters. But there is also the risk that something too hard for quantum computers to decrypt may also be too expensive for computers to encrypt. It definitely is a step in an interesting direction though. I wonder how do we advance this further? I'm not an expert on the topic of encryption and quantum computation. Just worked on it for a while.

    • @f_u_m_a_r_o
      @f_u_m_a_r_o หลายเดือนก่อน

      @@rumplstiltztinkerstein Actually we aren't picking spots, though that would be an interesting approach. ( I may be misunderstanding you though. ) Here we just load the cube with whatever the plaintext is. The key is just the set of update functions for each dimension. An update function is just a random 1-1 invertible function on the integer values of rows, cols, etc. We basically apply these individual functions in an intensely entangled way. After N steps, we have the cipher text on the cube. Then someone with the key is able to undo all the transformations, run the CA backward. I think of these update functions as the "reversible CA rule." I agree that it looks hard to make parallel. Which I think is a good thing as far as untangling the cipher text goes. If someone REALLY wanted to use a system like this at high speed, I suppose they could build "tesseract chips" that compute an entire dimension in one sweep. Because you CAN parallelize that part. The rows are updated independently. But then the column update diffuses the rows into one another, and so on. I think a specialized chip could encode in 4 steps per round. But I'm not an expert on this stuff. I went to school for math, took a couple of independent studies with a specialist, but that's it. How to advance this further ? I THINK this particular framework can be generalized to n dimensions. What might be fun (if possible) is bringing in complex numbers (Gaussian integers) or maybe even quaternion integers. It would also be easy to switch to some other base, like base 3 or base 10 or hexadecimal. quatarnians

    • @rumplstiltztinkerstein
      @rumplstiltztinkerstein หลายเดือนก่อน

      @@f_u_m_a_r_o Interesting. I'm a software engineer only so I'm not very familiar with the mathematical concepts themselves.

    • @f_u_m_a_r_o
      @f_u_m_a_r_o หลายเดือนก่อน

      @@rumplstiltztinkerstein I'm more of a math person who codes on the side, mostly to see certain ideas worked out at high speed. nice thing about crypto is that the math is very concrete.

  • @Katiethekitten
    @Katiethekitten หลายเดือนก่อน

    What is a real world use case for this?

    • @f_u_m_a_r_o
      @f_u_m_a_r_o หลายเดือนก่อน

      Basically it's one more symmetric system among others. So you could encrypt files, trade secret messages. This "toy size" version encrypts 256 bits at a time. You could something like this to process blocks and create an encrypted chain of blocks, so that you can encode large files. But you'd want a bigger version of this idea, so that there are too many possible keys for a brute force attack.

  • @creeptones
    @creeptones หลายเดือนก่อน

    Is there a practical application for this?

    • @f_u_m_a_r_o
      @f_u_m_a_r_o หลายเดือนก่อน

      Yes. One could use it to encrypt files locally or to exchange encrypted messages with friends. Basically you create a key, and whoever has that key can encrypt whatever messages were encrypted with that same key. ( You'd want to use a bigger version than this "proof of concept" demo. )

  • @nathanielbarraza760
    @nathanielbarraza760 หลายเดือนก่อน

    You should look at the codes found by Douglas Vogt he has a book on quantum computing.

    • @f_u_m_a_r_o
      @f_u_m_a_r_o หลายเดือนก่อน

      Thanks ! I'll check it out.

  • @iantsai6082
    @iantsai6082 หลายเดือนก่อน

    Buttholes connecting to the toilet

  • @kfc_luvr_4eva417
    @kfc_luvr_4eva417 หลายเดือนก่อน

    what

  • @graym4002
    @graym4002 หลายเดือนก่อน

    Considering that the goal was a symmetric cryptosystem as a work of art, this is great! I'd be curious to see that referenced 64-bit implementation with a graphics library, where the 0's and 1's are perhaps white and black squares, to more effectively illustrate the "movement" of the cellular automata at scale. Again, nice work!

  • @f_u_m_a_r_o
    @f_u_m_a_r_o หลายเดือนก่อน

    I misspoke early in the vid. The row permutation is a function from 0 to 255 to 0 to 255. For instance, maybe f(23) = 234. Same with the col permutation. So the number of possible keys is (256!)^2, if one assumes the use of 64 rounds (for instance) of encryption/decryption. One can also let the number of rounds be the final part of the key.

  • @duothehybrid
    @duothehybrid หลายเดือนก่อน

    tetoris

  • @iKarma420
    @iKarma420 2 หลายเดือนก่อน

    I... what does it mean? All your vids feel like analog horror lmao. It oddly tickles my brain in a good way though

    • @f_u_m_a_r_o
      @f_u_m_a_r_o 2 หลายเดือนก่อน

      I was going for something vague and suggestive. Horror is in there, but I was also going for a transcendent / detached vibe. Maybe the videos are (lots of them) metaphors for the cosmos as a kind of machine or wheel.