One of the most interesting fields to emerge from the study of Universal Energy is a very unique and quite imposing application in the field of a secret method of hiding content. Text, image… doesn’t matter.

Every aspect of research has worked from the source algorithm and applied conditions to it.

One such condition is the combined state of encryption and decryption.

Encryption has been treated like the history we have for contained things. One encrypts words and letters to be difficult or at least obnoxious to open and read. Infinite Encryption (IE) is named that because of the way it operates.

Infinite Encryption (IE) captures the entire document, not what it is made of. Encryption is based on the content being encrypted not the parts that make it readable for humans.

The current method treats content like it is inside a box where a lock and key is needed to both secure and open that door. Current methods deal with the parts of the whole (document.) IOW: each element of the document is encrypted and therefore able to be brute force extracted.

So what does a typical encryption look like? Go here http://www.inet2000.com/public/encryption.htm as it is based on session keys that are different with each use. But the encryption is just letters and readable.

EXAMPLE:

THISGETSENCRYPT is encrypted to be this:

M3tLBgtTutJmw

Now try it in IE:

|ûÉÉɳ¼|ûÁÁ³Á·|¬tl œÌ,œìÌ>¬tlLLœì,ìÌ>lŒìÌ ,ìÌ>llLLlÌ>¬ LŒ lìÌ>¬tÌŒ ì lìÌ>,,ìŒLìÌ>¬tÌœœœ œlÌ>¬t œŒ¬lÌ>¬tÌŒ ì lìÌ>,,ìŒLìÌ>Œ¬œ lÌ>¬ LŒ lìÌ>¬t¬Ì LŒLìÌ>¬tlœÌ¬œ¬ìÌ>¬tì œìœÌìÌ>¬tlLLœì,ìÌ>̬l ¬œlÌ>¬tLŒÌŒœœlÌ>¬t¬L¬ÌllÌ>¬tllœ,¬lÌ>¬t¬Œ ¬Œ¬lÌ>Ì,,ÌlÌ> ÌœœLìlÌ>LÌlœœìlÌ>̬l ¬œlÌ> ÌœœLìlÌ>ŒŒl,llÌ>LÌlœœìlÌ>¬tŒ¬œì llÌ>¬t ìLœllÌ>̬l ¬œlÌ>¬tŒL¬ìÌ>¬tÌ, œ,ìÌ>¬tÌœœœ œlÌ>¬tÌŒ ì lìÌ>,,ìŒLìÌ>Œ¬œ lÌ>Ìì ìÌ>¬tÌ, œ,ìÌ>œ l ,ììÌ>l¬LœlÌ

Go ahead…. Break it.

IE on the other hand, treats content like the whole it is. No two encryptions can ever be the same. (The demo below has forced a single key set and will repeat AND this is not like the SSL 128 bit you are used to.) IE consists of one string of data for the entire document. Regardless of size. There are no publicly accessible keys and each encryption carries a different internet set of three interlocking keys no one can ever identify.

Try it yourself!

How this works is not public. The algorithm is. Try it.

In the future I will be adding a way to paste an IE message for encryption.