Thursday, December 28, 2017

The aalan weltanschaung - height of crypt-dream


The following is height of crypt-dream outline of becoming the richest man in world, profoundest intellectual so far on earth, and how to bootstrap to it. It is believable but provably useless for anything but belief test! It is long, logical, absurd but fun imagination. I sincerely believe in it.

My generic blockchain world has consumers (or consumer agents) and Miners, A pair of consumers called the giver Alice and getter Bob wish transmission of entity product through some miner representative agent who interacts with other miners and maintains a distributed ledger. It is assumed that there is allies that wish to ensure taxes are paid and can do warrantful decryption by force. There is also many evil easvesdropper Eve and evil modifiers Malloy who might subvert arbitrary miners. For understanding, consider coins from giver to getter.

Aalan

Unlike other languages, syntax is not a matter of choice but existing inadequacies. Eventually it is designed to win compulsorily – it provides the best of all others and is currently the only way to get these

1.       Library primitives to privacy preserving blockchain
2.       System-level efficient multiple inheritance
3.       Non-deterministic programming

As well as ideas from other contemporary great efforts of

1.       Concurrency from Go
2.       No linguistic garbage collection from Rust
3.       First class scope from angular js
4.       Functional operations from shell
5.       First class function values from javascript
6.       Multiple simultaneous error returns from Go

And small but crucial syntactic sugars of

1.       () versus {}
2.       Arguments by category
3.       Meaningful compaction

Rest is overview of the implementation goals and why!

Doubt 1 – As stated, there is NO solution!

Reply 1 – For NO one on earth but me. Think of practical cases. Suppose a Canadian firm allowed undecodable encryptions. Indian police would be rightfully upset as it would be also used by every criminal! So they would demand forced decryption with proper warrants. Possible if the secrets of the encryption field were given. Such a doing by Canadian company gives India police enormous powers of forced decryption of all else, no Canadian need later, never mind corrupt folks in Indian police later! So Canadian company says no. So Indian police convinces GOI to banish products of this company!

Similar scenarios have happened. No police can allow unbreakable encryption. Feds v. Apple was so. Enormous number of users can be mis-decrypted by state or an enemy using one turncoat. China USA is big battle. How can I do it, uniquely bypass the lacuna?! By having nearly as many encryption fields as the number of some multiple of consumers! By changing every field every year or month or week!

Doubt 2 – There are plenty of smart encryption fellows!

Reply 2 – One must consider security and privacy, a tension throughout human history. No privacy leads to big brother and tyrants of one kind; while total privacy leads to crime, underage sexuality, cannibalism, destability and tyrants of other kind. The USA solution is greatest approximation with strict warrant-ful control on breach of privacy! One can never allow unbreakable encryption. But every exposure of the field parameters leads to turncoats and destruction of other people privacy.

The only solution to this conundrum is as many IBE encryption fields as members or more. It is easy for me, impossible for others! And no one on earth can do what I can!
Among other applications, I can build unlie-able trademarks, untappable phone conversations, guaranteed secure mail, unusable if pirated video etc.

Doubt 3 – There is no way to bootstrap!

Reply 3 - Beyond some point, my empire will grow from money raised internally from products sold. How does one get to self-growth point? Especially if I have deep doubts about business acumen of self! The answer is venture capitalists, who must have a convincing demo. So that is job1. But how?
If I gave away my root extraction, that is crown jewels! But wait a minute! A toy implementation on 16 bit bignums can be made that does only operations on 16 bits now, but can work for 1000 bit primitives directly!

This simulation is not done yet! What about square root which will leak even from toy implementation! However for 16 bits, one can do something impossible for 1000 bits – make a table of square roots! There are 64K numbers. So one can make them for 1-9 people in the world for half a million element tables. Anyone can ask for square root of any number in family semi-prime and it is just a table lookup!

In fact, I solve the problem of impossible bugs in my 1000 bit arithmetic! The toy requires simple 32 bit operations. In fact, difficulty for evil in my world can be appreciated by 64 bit arithmetic!

Enormous development

One utterly remarkable upshot of this documentation is that not only does it present very simple and convincing outline to blockchain that is central to new-21, along with many other encryptions, it is all based on a problem only I can solve on earth! What is more, demonstration programs can be built that simulate this primitive and all essential user code can be open source without empowering competitors in any way! Even this property can be demonstrated! So let me expose nearly everything, also nothing!

Only secret, earth-wide, that I have is computation of square roots of 1000 to 10,000 bit integers, modulo semi-prime. Computation of squares is easy and requires very little hardware. Hence checking a square root is cheap. But computing it is exponentially hard.. Simulation for a small integer, 16 bit, is easy as all the squares can be enumerated. One can make all things discussed here, except root calculations, open source. In turn, the software can be built using copy-left. The square root extraction can be done secretly inside protected hardware. The results can be checked.
Nearly half the numbers to a (semi-prime n : a/log n) are modulo squares. For 1024 bit integers, 1013 bit numbers are. This means 1013 bit keys are available!

TO USE ENCRYPTION THAT IS IMMUNE TO ADAPTIVE AND QUANTUM ATTACKS, one uses a double encryption – outer-quantum-computer-proof-inner-my-IBE. Knowledge-able will correctly guess the details. For all else

Encryption (Message-1gb, key-1024, Alice-private-data, Bob-public-data) => eMessage-1gb+10%, key-square-1024, more-3000
Decryption (eMessage-1gb+, sqrt-key-1024, Bob-private-data, Alice-public-data) => message

To send encrypted to bob, encrypt message using consumer-choice- key and send the encrypted with key material. Provided I secretly send back the sqrt (after authentication) decryption happens. Bob does not care about how I did, sends me asked square encrypted and I answer sqrt encrypted.
The sqrt is required in this scheme! It can be cheaply checked. But NOT extracted. The quantum computer enclosure is needed. Much smaller key-material can replace it with OAEP+ RSA. However New-Hope-Simple is fast enough.

Two semi-prime protocol aa2

I have built my IBE around two semi-prime, one whose factors I know and one I don’t! This allows messages undecode-able by me to be passed. Imagine a nation where Alice resides. It may require key escrow deposit before the semi-prime can be used. The message is still secret to me. Associated with any allowed semi-prime is a signature which must be attached by any sender. False attachment is Warrant-evade crime! Police permit properly escrowed semi-prime, fail only with warrants, detected reliably and receiver punished without further cause. False entrapment fixable. My semi-prime only eliminates man-in-the-middle by providing identity proof!

Let us call escrow deposit and signature process registration. Sender needs to register in the destination, while the destination must be registered in own nation. The sender might be required to send copy to self of all external mail. This allows warrant in send and receive jurisdictions. Eve and Malloy are useless.

The aa2 allows the destruction of any address without exposing any previous mails! It is done causelessly to automatically destroy any leaks every year or faster. Any address may be destroyed at once for cause. In one application, locks are changed whenever an employee e leaves in all locations where e might have a key!

Signatures

Trademarks are essential but enter extra costs. Clearly, provider is interested in enforcing trademarks while consumer wants the quality but not have the extra cost. Legal method is attaching symbols and distinctive containers to products. Breach is done by false copies of marks to malicious smuggling.
It may be to goods, even money. Suppose every nation had a semi-prime. All the notes would have a field from which a uni1que serial number was extracted. It would be followed by square root. A local check can be made that the serial number is genuine and that the square root squared reproduces the serial. This is a fool-proof local check to devastate Pakistan! Same works for Gucci making bags. Trademarks in general. What can be better than eliminating the criminal PTO of USA!

Another is automatic fee payment to continue encryption address beyond current year.
In one application, banknotes lose value fully every year – they must be exchanged in banks every year after a record is made. The record itself may be encrypted to allow signatured recorded permitted access only. One can reap demonetization benefits without one!


Apart from becoming the richest, a number of warrant-ful applications can only be possible in my encryption! USA judges complain incessantly about use/abuse of privacy by suspect’s lawyers! Civilization forward is the continuous battle between privacy and security. Only I have technological not legal ideas – one you can breach, others you cannot!

Tuesday, December 26, 2017

The modi school student


Beyond the painful attack by my illustrious senior on Modi and my total discount of his goals as only possible in extreme totalitarianism, following is a positive note on how India will move forward and avoid the coming pandemic disease of century-21 of unemployable multitudes that will devastate western populations. If anything, green level control of pollution is the only true universal public service in India. One must really believe that blockchain technology will eliminate the middlemen – equals middle class and not for criminality or inefficiency, but competing against vastly less criminal and vastly more efficient machines!

These are 4-pillars already launched and more in my mind.  Launched are digital payments, Make In India, Start-Up India and Skill India. Start-up India and skill-India are the basic essential weapons against joblessness. Make-in-India, also on swap basis is absolutely essential protection against higher efficiency elsewhere. Digital payments as absolutely essential to cut parallel economy and devastate state enemies.

It is possible with almost no honest pain to do annual demonetization!

One may do symmetric-swap Make-in-india&x .Asymmetric fine where tech is imported but not jobs-value-added.

Skill-India gets a massive boost from my incentives with 1-level pyramid marketing – government shares a part of taxes collected from the skilled with the instructor! In fact, no reason NOT to make it for all education!

Start-up India, the best tonic is ease in taxation at early stage.

Reservations are neither entitlements nor caste based but atonement by the capable for the sins of our forefathers. Two critical changes to devastate behenji and hardik the monster – reservations NOT based on caste but income (Bottom 50%) and timebound move from caste based to income based. Fuck the creamy layer reservations and Hardik!

Education rights (Fuck the commie based distance based admissions) essential. Why?

1.      Todays unemployed are tomorrow voters
2.      Society without exploitation possible only then
3.      Proper education essential to fight western pandemic shaping up


4.      I can extremely confidently say that every skill-India scheme by ALL government servants will be fucked –up, only superior to Janata ideas. So fucked are AAP, Congress and BJP models. Who next? Market! Incentives! Mother-fuck every wise guy!

Arun Arya on Languages 2017



If epistemology=GIT(=linus Torvold) then
  1. JAVASCRIPT
  2. PYTHON
  3. JAVA
  4. RUBY
  5. PHP
  6. C++
  7. CSS
  8. C#
  9. GO
  10. C
  11. TYPESCRIPT
  12. SHELL
  13. SWIFT
  14. SCALA
  15. OBJECTIVE-C
Are the most popular 15 languages in usage-popularity order in 2017. I say learn 2 (Python, Go) and idea behind angular js and win in 2018. Other experts are ancients!

This kind of statement is very deep and can be made by experts in PL only – I am one. 9 out of 10 in m tech CS from IITK became ancients long ago. I did not because I spend time in predicting then learning.

1977 - I started before internet, when structured programming reigned.
1980 – Wonders of object oriented programming. the vtable. Natural extension in inheritance
1985 – (Waste) Latex
1990 – PGP, poor fucked up MI in C++
1994 – HTML and ability to attach handlers to image objects and render images without fixed aspect ratio.
2000 – Approximate searches – Google
2008 – Emails as automatic events – Facebook. Fat pointers in Go.
2014 – Bit coin, mining implementation of distributed contention. cheap type checked threads in c#
2018 – aalan = privacy preserving blockchain, fat variables, non-deterministic ll-1 programs = expanded Go

Go has already surpassed C. It has right idea of fat pointers (rare), expanded to fat variables in aalan. Python does shell well. Idea from angular JS, central to aalan, independently discovered is scope as a first class value. Many modern languages have made new kinds of first class values – ancientifying great painful innovations of their time!

Object oriented – modules as 1st-class
Javascript – functions as 1st-class, eliminates inheritance

Angular js – scope as 1st-class, like smart staging, ancientifies Go

Aalan – privacy preserving blockchain, fat variables, non-deterministic ll-1, fights Go and python
Fat variables allows multiple inheritance (essential primitive in aalan, ancientifying c++, c#, java, and friends).

Privacy preserving blockchain by library calls to components implementable in hardware
ll-1 – reason why new syntax needed eventually, declarative statement of intentions, let computer figure out how to implement semantics




Monday, December 25, 2017

Hardware blockchain



Su in our class-of-75 group wrote about Dubai doing blockchain by 2020 and motherfucking beasts I despise most – lawyers and government servants. I am very comfortable with blockchain as it is rejuvenation of supermedium of my thesis – done well with Ethernet based public contention secretaries. Bell labs, sandy Fraser and ken Thompson were no fools to hire me in 1980, or when they fired me in 1986 for non-delivery for all networks.

That happened because I never could imagine lovely mining method of distributed contention resolution. Yet it is a beautiful method with built-in method for incentives, paid for in currency controlled! Bitcoin for you.

Great for all including NSA. Perhaps Dubai will be the first state fully fuck able by NSA by 2020. Or my war-cry to sell my privacy-enforcing hardware! Cryptonote with ring signatures and zcash have two other algorithms. Both and more like them in future have a problem I don’t – failure happens on breach of security by a miner! It could be fully secure and private from outside, but NSA is expert in targeting and subverting key guys and gals!

My solution is simple – encryption is maintained whenever outside hardware! Let AAP and Hardik yell about hacked EVM machines. My solution – punitive responsibility! Lock up chief honcho, picked hackers and machines for 2 hours. At the end either successful or not or excuses (like we would have but we were missing x). Punitive means excuses ignored. Yes or NO.  Election commission fucked or AAP? HARDIK (10 years labour prison, nothing to fix)!


My solution open to experts. But done in protected hardware! Like  inside batteries with mechanical wire switches in TEMPEST protection shells, dynamic temperature circuits bathed in oil etc. Several such facilities on clouds ok.

Sunday, December 24, 2017

Mad New direction



Commenting on  http://nayidisha.com/

This is long painful reply to the publication by an accomplished senior of mine who has gone mad! The reason is simple – there are political imperatives why congress and bjp are united – the only way to accomplish Sir nai disha (Sir new direction) is extreme undemocracy – totalitarianism. In the unlikely case of win, by this platform hidden, Sir nai disha will face massive mid-term losses and true pathetic defeat!

Frontispiece is my changes which might survive. Here is why –

Full supports to GST rates is dumb and anti-economic
Elimination (minus flaws) of right to education is criminally stupid
Upfront elimination of reservations, price caps, retrospective taxation and anti-mnrega is criminal political hara-kiri i.e. suicide

This fellow is certainly a buffoon after great accomplishments!



Saturday, December 23, 2017

ArunArya Augmented Shared Virtual Reality AASVR



AASVR is my invention, natural from AR and VR, were SVR is pronounced as if SCR was spoken but the k became a V. It names 4 important characterizing components –

A – Augmented reality which inputs reality but augments it by removing certain colours by making the objects transparent, somewhat like a GIF. The transparent objects only are filled by VR. Suppose one were to mark a rectangle on a wall blue. Now one can view scene through my instrument in which blue is marked transparent. VR will paint only the transparent portions. The consumer can paint a TV there! Project slides! Remains a blue rectangle for all others

S – Shared. Others MAY look at what the first does. Or see another channel, fool the principal! The principal may be elsewhere dressed howsoever. May even be dead only a software playing! Even pretending to be alive – differently to different people. Or perhaps missing only, not dead!

V – Virtual reality from real video shots with blue screen overlay like burning buildings – of toy scenes, enlarged and blue screen merged. Somewhat like dragons in game of thrones! One can so simple applications and import the complex already done!

R – Reality

Characteristics of AASVR , claimed by me, of AASVR is double chromatic subtraction - both AR and VR layers. In fact, the VR layer could be another AR layer (blue chair on green screen, green subtracted, overlayed on reality with no subtraction). A computer tether is NOT needed!

There is the interesting issue of perspective. 3D pictures are only possible by fusing two images. Two individuals are at different location only with different perspective. Continuous deformations allow a finite small representation of any object recovered from many 3D pairs/ Then the object can be examined in 3D from any perspective.

Unlike complex VR or AR, AASVR can be implemented in cheap mobiles. So it will not compete with occulus rift. It will blow other similar cost phones out of water!

None of this is sci-fi but cutting edge 2018! That’s exponential curves for you! If Amdahl’s law holds to 2020 (very likely), you have seen nothing yet!

Synchronized vision


Virtual reality VR is allowing people to see their choice. That is where my imagination ended, even though VR is on precipice of realization. I EVEN DREAMT OF STOIC HEAVEN WHEN AVATAR WOULD BEGIN TO TRANSMIT INFORMATION BACK. On all channels – sight, sound, smell, taste. Even that is on precipice of realization. Time to expand and start looking at “so what?”

1.       Heaven for kids and adult kid-like – Be that person or object! An actor, actress, formula driver, sports figure etc. could carry the instruments to broadcast the feelings. So would space craft, LHC etc. (virtual feelings).

Smart business would differentiate in prices between vision, vision + audio, vision+ audio+ acceleration (possible with customer strapped into a ferris-wheel) etc.

2.       The BBC brainwave control could be generalized, like some new US toys from star wars and Jedi emulation.

But Time to expand and start looking at “so what?”

1.       Empathy amplification – nothing like imagining in other’s shoe, except even better share the experience virtually – handicaps, race, struggle etc.

2.       An object is real if many people see it same (perspective different). That is particularly easy for VR to synchronize! Entire family may share a virtual house with objects. Family may meet each other in rooms.

3.       Family could be friends. Leaders etc. Modi would present his dream Bharat, Rahul would too. Then it falls on voters as to who to believe!

4.       Dresses, locations, diseases etc. do not matter! That is how class-of-75 reunion 2030 happens! Then IITK director etc. can be invited in the meet. We (avatars) can go to sports ground for joint pic.

5.       No worry of deceased colleagues. The reunion can be held till the last one lives. The avatars are immortal. They may be attached to software post death. Transparent unknown switch!


6.       And who will the last one be? The reunion will likely not be held thereafter! unless the alumni section is instructed to have a virtual meet after first 100 then 1000, then 10000 etc years, Virtually. We will not ce around. But IITK will be. So will its alumni department, called whatever, then.

Sunday, December 10, 2017

Remarkable strides to aaquantum


I have tried to get approximate understanding of Universe I live in all my life and concluded long ago that ALL known religions (ALL major once) are criminal and the remainder of scientists don't know enough.  Where do I live? And Who am I?

Aaquantum, my dynamic belief system has one major pro and one major con – It is dynamic allied with the latest science and beyond (epistemologically possible). The major con had been “don’t know” answer to many century old questions. But in 2017, the fog is lifting in physics, as the basis of many sciences becomes clear even as we remain totally ignorant of mathematics underlying machine learning. Coherent belief, science way, is possible.

The understanding of physical basis of reality springs from increasing understanding of quantum mechanics that not only improves the ubertheories of very large of cosmology and speculative coherent cosmogeny and very small – have no known exceptions - but have not been unified despite effort by hundreds of Nobel laureates and likes for century. I even can see why the effort failed.

First better quantum mechanics. There are 4 quantum fields - three force and one mass – Higgs. Everything is a wave in one of the fields - electro-magnetics. These wavelets are emergent as particles if Higg’s is in play, or as a photon if not. Gravity is also emergent from Higg’s from entanglement!

This emergent gravity approximates Newton’s law but is different (Einstein) for speeds near light, or subtly different for astronomical events – gravitational lensing, mercury perihelion, or GPS signals. But Einstein has still a very subtle shift that evaporates with dark matter and dark energy.

Classic reason for dark matter was speed of stars in galactic rotation. In both Newton and Einstein, the force drops inversely as the area of sphere. Further away from centre a star is, slower its speed. But that is NOT what one measures! After a certain distance, the velocities become constant!

Wrong answer was dark matter, useful otherwise too.

Then the intergalactic accelerations were found increasing. Answer is dark energy of course! Has to be different than dark matter as it remained the same despite space expansion. Only possible if it were property of space itself!

Enter Verlinde and his brand of string theory. Suddenly, the idea of qubit (quantum bits) enters gravity. Verlinde casts gravity as a by-product of quantum interactions and suggests that the extra gravity attributed to dark matter is an effect of “dark energy”—the background energy woven into the space-time fabric of the universe.

Instead of hordes of invisible particles, “dark matter is an interplay between ordinary matter and dark energy,” Verlinde said. To make his case, Verlinde has adopted a radical perspective on the origin of gravity that is currently in vogue among leading theoretical physicists. Einstein defined gravity as the effect of curves in space-time created by the presence of matter. According to the new approach, gravity is an emergent phenomenon. Space-time and the matter within it are treated as a hologram that arises from an underlying network of quantum bits.
In his calculations, Verlinde rediscovered the equations of “modified Newtonian dynamics,” or MOND. This 30-year-old theory makes an ad hoc tweak to the famous “inverse-square” law of gravity in Newton’s and Einstein’s theories in order to explain some of the phenomena attributed to dark matter. That this ugly fix works at all has long puzzled physicists. “I have a way of understanding the MOND success from a more fundamental perspective,” Verlinde said.
So goes dark energy as a qubit property of space and dark matter as interaction between qubits and matter through gravity which is emergent entanglement! Amazing thing is it hangs together and brings together two hitherto unconnected concepts of entanglement and gravity together in peculiar but compelling way. Gone are the flights of fancy of the reason gravity is unlike any other force and crosses universes in the multiverse.
And why the fail in unifying three forces with gravity over last 100 years? How can you unify three quantum field with non-existent non-required quantum field for gravity! Even graviton concept is bad, explaining why it was never found.
So there is just one quantum field that became 3 due to energy – unification requires energy vastly more than TEV. Gravity is just emergent phenomenon like emergent space-time by holographic principle applied to the ultimate reality of space-time! Ultimate reality is qubits and entanglement with neutrinos, electrons, quarks and gluons. No known conflicts. Not all are explained, or can be. Why 4 fields, not 3 or 5? Why obey any laws? Plenty of research questions. Still I have reached a stable plateau! I HAVE to listen to NO religious bullshit to answer questions about my Universe!
Mark my words – Dutch Verlinde gets the Nobel Prize and will be celebrated as the new Einstein!



Friday, December 8, 2017

Evolution and emergence


These are two truths for coming million years. Evolution is how high-anti-entropy life increases complexity locally while shedding entropy elsewhere. Emergence is some statistical properties of ensembles that assign definite invariant properties where there are none in the components.
Classic example is Pressure, volume and Temperatures. No concept of P, V, T applies to particles at molecular level. Nevertheless, these are meaningful invariant concepts at gas, liquid and solid levels. We say that P,V,T are properties that are emergent. Time is not involved, as it is in evolution.
Energy and Entropy are not emergent concepts. All else are. Energy can be energetic as in photon, or as matter. 100 years after birth, quantum mechanics makes some sense and the reason for difficulty in quantum gravity has started to make sense.

QFT or Quantum Field Theory

New image of matter and forces is that they are quantum fields in space. A quantum particle is a wave in the field. There are three corresponding to three forces – electro-magnetic, weak field and strong field. The fourth is least known and most interesting, the Higg’s field that allows chemistry and imparts the very concept of mass – matter is simply photon-waves that excite the Higg’s field.
Now the most interesting speculation by me – gravity is simple emergent entanglement over Higg’s field! One can view entanglement as fifth dimension timeless connection between two space-time points. Now one can see why gravity is Universal from “Higg’s field”. Gravity falls as square (surface area of the enclosing sphere).
Together with non-merge of Black holes with any matter, this completes exciting speculations in astro-physics and cosmology!
One can think of emergence as evolution over numbers! Or evolution as emergence over time!


Encryption ideas

Evolution of my encryption ideas is yet to be seen. Emergence is the orthogonal to thinking of executives and politicians! It is the tool of small timers like me, to whom the dictum applies, “persons looking for applications for their invention”. Nevertheless, it is achievable with low capital and laces many small emergences into one big can be big! One can view my work 1995-2005 as shift into simple asymmetric and classic symmetric encryptions.

Emerged from that new identity based encryption IBE based on huge discrete square roots in next ten years. I sat through encryption class from Stanford professor and gave up as train-accident grandfather. But numerical evolution has probably blessed me most. Next seven years were chasing quantum computers and QC-safe IBE.

The basic concept is encryption composition of two systems S1 and S2. To use the composed system, one starts  with a message M, applies encryption of S1 and then of S2, sending the result. To decrypt, s2 first then S1.

Why would one do this?

The composed system may have desirable qualities of S1 and S2 in provable manner.

Why is your encryption one always?

It is based on squaring. X^2 can be done as x*x! So one can implement it in very simple manner, regardless of integer size. One can compete with much smaller elliptical encryption! The circuit size for the sender can be very small.

Best way is to trust huge digest functions from NIST. Regardless of length, one can digest a string. Repeated squaring of the digest, using only logsize bits, produces truly random sequence to which the message is xored for encryption and decryption. The digest is sent by my IBE!
My IBE simply square the digest, symmetrically encrypt it with my published encryption function and key and send it by RSA. In effect composition RSA o oaep+-cryption o my-IBE is used. To escape quantum computers QC-method o My-IBE is enough. One decrypts the top word of the message. If it does not decrypt to 11..11, the message if not for you! Quantum-IBE is not needed.
If one considers just RSA o My-IBE, just RSA is insufficient as IBE form does not work, while my-IBE admits adaptive attacks, the joint form avoids both. QC-method o My-IBE avoid QC_IBE but protects my_IBE from QC!

Standard way old RSA was used is RSA o symmetric. Given strengths of symmetric, many extensions can be used to make 2000 bit long RSA key!

So IBE emerges from my straight encryption. Doing it distributed ledger fashion emerges a privacy-preserving bit-coin. Quantum-computer-proof-my-IBE yields unbreakable bit-coin. Deducting a percent transaction-tax per IBE transaction yield a tax-fair system!

Quite an emergence! A million-year truth!



Tuesday, December 5, 2017

My first speculative astronomy research



Self link to latest
A note in Facebook by Robert Karl Stonjek is there is a strange correlation, imagined by me as factor of 0.7, not 1.4

Mass.................BHU...............Pass?.....Object
3~5................3*1.4=4.2.............√..........GRO J0422+32/V518 Per
≥4.9...............4*1.4=5.6.............√..........GRO J1719-24
c. 5.8..............4*1.4=5.6.............√..........GX 339-4
6~6.6.............4 or 5: 5.6 or 7......x..........GRO J1655-40/V1033 Sco
6.4~7.2..........5*1.4=7.................√..........XTE J1118+480/KV UMa
7.2~7.8..........5*1.4=7..................x..........GS 2000+25/QZ Vul
6.4~7.6...........5*1.4=7.5.............√..........GRS 1124-683/GU Mus
6.8~7.4...........5*1.4=7.................√..........XTE J1819-254/V4641 Sgr
8.1~11.3.........7*1.4=9.8.............√..........XTE J1650-500
8.4~10.4.........7*1.4=9.8.............√..........4U 1543-475/IL Lupi
8.4~10.8..........7*1.4=9.8.............√..........XTE J1550-564/V381 Nor
9~13................7~9: 9.8~12.6.......√.........Cyg X-1
9~13................7~9: 9.8~12.6.......√.........A0620-00/V616 Mon
10~14..............8~10: 11.2~14......√.........V404 Cyg
10~18..............many pass............√.........GRS 1915+105/V1487 Aql

Where mass is measured as multiples of Chandrasekhar limit. The Chandrasekhar Limit is now accepted to be approximately 1.4 times the mass of the sun; any white dwarf with less than this mass will stay a white dwarf forever, while a star that exceeds this mass is destined to end its life in that most violent of explosions: a supernova. The remnant become a neutron star. Neutron stars grow to become black-hole after merging – Must be half the limit i.e. 0.7 solar masses after most of mass is shed in the nova.! It is assumed the black holes grow only by merges when neutron stars collide or both are black!

The reason is simple – around a black hole is an event horizon. To any mass that is pulled by the gravity, time grows slower and slower, in effect infinite time to fall in. But for some reason, the black holes (or one neutron star) can merge! This leads to quantization of masses!

Compare it to quantization in nucleus of the very continuous Schrodinger equation caused by forced integral electron waves which HAVE to be complete! Mathematically, we take eigenvalues. Perhaps the matter is similar for black hole masses.


Tolman–Oppenheimer–Volkoff limit

Why do neutron stars live and why do non-super-nova leave nothing behind but another smaller dwarf? Dwarf stars balace electron degeneracy with self-compaction gravity. If that is not possible, then similar to Chandrasekhar limit is TOV limit based on neutron degeneracy. Pre supernova, 30 solar masses are needed. After supernova, neutron star emerges!

Now the speculation. Why quantum-ness? There must be integer number of merges. Its either 2 neutron stars or two holes. Two neutron stars meet in finite time Two black holes are enormous waves in Higg's field! For them, unlike ordinary mass, time aspect of space-time can be neglected. So they can merge in finite time.

What happens if two large enough black holes merge? Big bang at the merged nuclei! Perhaps, our universe is inside of black hole! The CMB is at the event horizon.

What happens to neutron star pieces? Before they compress to nuclei ball (not point), they lose entropy using bi-state quantum particles.



Monday, December 4, 2017

Train-accident-like post-quantum IBE


Train-accident-like Grandfather is me, don’t understand deep mathematical details, believe certain things by reference to so-called sir-math and construct new applications assuming that sir-math has already proved the assumptions within the appropriate limitations, which can now be explored by them for my work.

We start in lattice post-quantum cryptography. It is assumed that right non-IBE single user field has been set.

KEM: Critical first part

Given two encryption systems, one S2 an IBE, another S1 not, both exponentially strong, one can build an IBE s3 similar to S2. In S3

Encry3 (s) = Encry2 (Encrp1 (s))
Decry3 (s) = Decry2 (Decrp1 (s))

Exponential-ness is important because trivial enumeration attacks are exponential.

Why would one build IBE this way? Certain weaknesses, e.g. INDCCA’s of the IBE can be eliminated this way, provided IBE1 is free! For example, my/cocks AAIBE is based on discrete square-roots of huge integers, well known to have INDCCA problems. One effective simple fix is s2 = square-root-IBE, while s1 = OAEP+ RSA. That in turn can be viewed as this structure, with a public symmetric encryption prior to RSA! The joint encryption is free of defects.

post-quantum non-IBE

Modulo fancy math limitations, let us define operations of +, - between vectors elementwise, modulo a global number. * is defined by polynomial multiplications, restoring the n-size by subtraction the higher powers.

Now let us call vector BIG if all elements are big (capitalized), small if all are small (lowercase). Basic rule is R = As + e is easy if A,s,e are given but post-quantum-crypt-hard to recover s if A, R are given. We call s the secret and e the error. Without telling anyone, pick own s and e and publish some A and R as this equation. Post-quantum-crypt-hard to get s. Depends on no one!

Encryption and decryption

To send Message, encrypt normal by any nice method which can be inverted by receiver knowing Key. Let the Key be encoded somehow in K. Now compute and publish X = Aa+b and Y = Ra+c +K for any small vector a, b, c.

Decryption is easy – Compute K(receiver) = Y – Xs. One can show that this K = K + junk.
Here is a simple way to recover K.  Sender only considers top w bits for encoding K. Receiver only keeps the top w bits. Just 1 bit over several is needed. Typical vector sizes are power of 2 like 1024.

There is the question of small. Let us assume a 1024 bit key and byte polynomials with hiding in the highest bit. One can remove smallness error  with reconcialation, or slightly larger (6%) key with no reconciliation in newhope-simple.

Every one publishes polynomial coefficients for the two public variables This is in add to the family semiprime and full name. My hardware extracts these from user computer, verifies them, encrypts and decrypts. The encryption to be send and decryption are published to the user computer. My hardware has a simple usb interface.

Every thing can be files and streams. Several Gb/sec can be handled allowing quantum computer proof sportcasts, telephonic & videophonic conversations, newscasts etc.

post-quantum IBE


Here S2 = post-quantum non-IBE while S1 = AA/cocks/OAEP+ IBE. Doing it so will import the self-break-able but foreign-unbreakable properties of AAIBE with corruptible police! Apart from other things my crypt-libertarianism survives quantum computers!

Crypt-libertarianism

Very few can point to something that survives 1000 years, let alone million or billion. But crypt-libertarian ism is different, it will survive the new civilizations next million years. That is the ultimate snobbery that finally trumps the USA Boston-Harver shrink-pope

Q Do you think yourself like Jesus Christ?
A (me) 1. Now why would I compare self to uncivilized shepherd so far back in middle east!
2. You MUST ascribe me more ego than that!

What is it anyway?

Libertarian ism without a head, built from soul of bitcoin, only assumption is that a numerical majority is never evil.

Saturday, December 2, 2017

Annual aaquantum 2017

Nothing but epistemology of scientific method is required to derive all from the only assumptions of external existence of the universe and compulsion of death to this apatheistic complete model of reality.

Full details of how the Universe came to be
The greatest gift of all is settlement of some of the quantum mysteries and realization of quantum wonders through nanotechnology!
Indefinite life - Is it even possible? How does one prepare for it? How to delay aging while waiting for transfection.

Why is the early social life of stoics in early Roman empire the humanity's golden age? Historically, there were five great emperors ending in the greatest philosopher-emperor of them all - Marcus Aurelius. I suspect greatness because as luck will have it, none could father a male, and had to pass on to adopted of choice. All till the last! There was NO democracy or term-limitation then.

Democracy with term limited powerful executive makes the qualities of emperor irrelevant. This is because the powerful can find the power somehow within the democracy. The weak cannot and become historical fodder. Institutional power provides checks and balances on the executive.

Now the next improvement is present - blockchain or my super medium!

Next decades

We are in the cusp with two technologies we can use but not understand! These are machine learning AI on giant neural nets and Quantum mechanics. Empirical advances are still possible and will happen through Hintonian capsule encapsulation of AI and atomic layer thick depositions for vastly revolutionary electronics. Politically and legally, power will shift to privacy-preserving blockchain or my super medium, both improved by adding transaction taxes and reserve requirements!.

Sunday, November 26, 2017

A model for Universe – sans dark matter and dark energy


Latest link

"The announcement of this model, which at last solves two of astronomy's greatest mysteries, remains true to the spirit of science: nothing can ever be taken for granted, not in terms of experience, observation or the reasoning of human beings," concluded André Maeder.
That is the FUNDAMENTAL difference between science and every religion! Things in lambda CDN, the standard Big Bang model, needed dark matter starting Zwicky in 1933, and dark energy since accelerated expansion, starting 1997. ALL observations can be explained by scale invariant space model here.

Is it the truth at last? Not in science! But very busy work ahead!

Saturday, November 18, 2017

Constancy of laws


Newest link

How do we know that constants in physical world have not evolved with universe age? Many strange pseudo-scientific theories are based on whatever change is needed to make reality consistent with the theories! One way to examine this point, (My own, not the thrust of paper) is to image distant (hence older) galaxies and look for processes there similar to near ones now, especially when dependent on constants and compare the old and new.

One is details of star formation! When done, there was a 1000 fold difference! Except this paper seems to drop the difference to factor of 10!


Paper also points out the compelling convergence of ground-breaking observations and sophisticated state-of-the-art simulations which suggest that the remaining differences can be explained by the turbulent nature of the distant galaxies.

Tuesday, November 14, 2017

Creation of elements


Latest link

As a proud apatheist, not only are religious accounts of creation pathetic, I am very curious about the filling in of gaps in lambda CDM, the standard cosmological model! When the big bang happened, even after cooling of several hundreds of thousands of years, only hydrogen, helium and some lithium were present. So where did all the other elements come from?

We suspect fairly certain, all till iron came from supernova explosions that enriched the galactic gas clouds with the newly forged elements. Why iron? All the heavier elements are entropically impossible, they came from collisions of neutron stars, or type 1A star explosions to form especially fierce supernova etc.

But science is not from great men or books. It is a collection of consistent hypothesis that match reality and are generated by the true rishi of the times, often extrapolated to discover new reality. Far more fun than the fact that earth is a sphere orbiting the sun are the observations of why a sphere and why orbit the sun! And the experiments cost lot of money and may fail!

Brings me to Hitomi. Before its brief mission ended unexpectedly in March 2016, Japan's Hitomi X-ray observatory captured exceptional information about the motions of hot gas in the Perseus galaxy cluster. Now, thanks to unprecedented detail provided by an instrument developed jointly by NASA and the Japan Aerospace Exploration Agency (JAXA), scientists have been able to analyze more deeply the chemical make-up of this gas, providing new insights into the stellar explosions that formed most of these elements and cast them into space.

The Perseus cluster, located 240 million light-years away in its namesake constellation, is the brightest galaxy cluster in X-rays and among the most massive near Earth. It contains thousands of galaxies orbiting within a thin hot gas, all bound together by gravity. The gas averages 90 million degrees Fahrenheit (50 million degrees Celsius) and is the source of the cluster's X-ray emission.

 Read more at: 
https://phys.org/news/2017-11-hitomi-mission-glimpses-cosmic-recipe.html#jCp.
Hitomi was an X-ray satellite carrying first class X_RAY spectrometer from US Goddard. The very big surprise from a yearlong crunch of just few month long survival, is that Perseus cluster spectrum analysis indicates elements and proportions like our sun! May be a coincidence, but otherwise how could it be? Arun – my explanation is that ALL (or mostly) evolutions of galaxies are the same in all parts of the Universe, and we will see the same thing repeatedly! Similar supernova enrichment and creation.

And my hypothesis does not have to wait long! NASA scientists are now working to regain the science capabilities lost in the Hitomi mishap by collaborating on the X-ray Astronomy Recovery Mission (XARM), expected to launch in 2021. One of its instruments will have capabilities similar to the SXS flown on Hitomi.

Read more at: 
https://phys.org/news/2017-11-hitomi-mission-glimpses-cosmic-recipe.html#jCp



Friday, November 10, 2017

Aaquantum card


The learning steps lead to a concrete proposal which is enormously useful, only I can do and disclose convincingly. The aacard proposed here is a credit card implemented using aalan., the aaquauantum language which only I can do, since it is built around sqrt of 1000 bit integers which only I can do and in fact can be done safely and engineering-irreversibly on  the cloud. There are three reasons for considering me

1.       All depends on IBE. Based on sqrt in 1000 bit field, only I can, on earth!

2.       Any IBE can be used. It is not a monopoly not doable any other way. Therefore, anti-trust cannot apply.

3.       There is NO sale of someone else’s development. Only things sold by me on cloud-like are the results of sqrt computations my way.

Communication to the cloud is a message [who-for: en-name, operation: en-tuple, args: en-tuple, reply-to: en-name, permit: en-new-permit], all encryptions are in public of receiver. The results, even if void are returned to reply-to which could be the sender or someone else. This is a basic property of aalan which allows -> to suffix a reply-to list in which each sender pops the list. Any part of aalan may be embedded in clock-loop, and any identity, pipe or communication only may be encrypted or decrypted.

Done +&= en {decrement-balance, order, sender-permit, sender-name, amount, digest-match}  -> list {keeper-clouds, me}
Done +&= en {increment-balance, order, sender-permit, receiver-name, amount, digest-new-unique} -> list {keeper-clouds, me}

Not needed explicitly are order, sender-permit sender-name. Auto en if en {keeper-clouds}!

Done +&= decrement-balance (amount, renew transaction) -> list {keeper-clouds, me}
Done +&= increment-balance (amount, transaction) -> list {keeper-clouds, me}

 Here is why atomic broadcast works –

1.       Everyone can verify the end-mining message.
2.       Every one defers to the winner’s order.
3.       The send and receive are distinct messages. There is no need to save the matching sender. In fact, the sender can break up the amount into a number of pieces on send, another on receive and only ensure decrements and increments match up, on summing. In this case, the digest is same for all pieces.

4.       ALL messages have to be decrypted in that case. One can implement this cloud on a multi-processor with distinct teams responsible for different parts. This way, any adversary has to penetrate lot of teams to destroy the privacy.

5.       Traffic analysis can be destroyed by all keepers send ghost amounts as transactions that sum to zero.

Resilience of aacard

Resilience is twofold, fork and join. What happens if the keeper set breaks into two? At joining, every holder is allowed to designate percent in each account. Thereafter, the holder has two disconnected accounts. Failure of a keeper or more is not a problem! The system is solid against failure. Here the nodes have not failed but are disconnected!

Join is trivial too. The balances in joining parts to the same holder are simply added in the composite account.

Rename of a holder is also easy.

What is the general case? Every account maintains a vector. Fork is a vector of functions, each taking the account vector and splitting it into two parts. Join is a vector of functions, each taking the tuple of two vectors. Credit card was easy, since each function was a plus, and arguments to plus were two index values for join and percent and old index value for fork. Now suppose each account number is some Chinese-remaindering representation and the fork is some subset of the basis. System is trivial to fix after a join or result of a fork. This has value in military systems which will split and join in very chaotic ways!

Protection of identities

There is automatic protection of identities, each is simply a public, private pair. Global 0x1001 could be used as exponent. Mod identifies the semi prime of the coin say M for aacoin. Now

Signature-1^0x1001% M-one = semi-prime
Signature-2^0x1001% M-two = semi-prime
Signature-3^0x1001% M-three = semi-prime

Two problems make it crypto-hard, three works on unknown methods. Rather easy if factors of M-j known. These three can be safely published, need checking, say once a year

 Signature-1 ^0x1001% M-one = digest identity
Signature-2 ^0x1001% M-two = digest identity
Signature-3 ^0x1001% M-three = digest identity

The triple works for all identities. For tuples, the right side is

Digest (tuple)
With tuple elements separated, say by null. Knowing the elements of tuple do not help in predicting subsequent bit changes, as length of string digested in part of digest

To executive readers


Despite TBI, I can be civil and voluble for 1 hour. If you have friends who are mystified by bitcoin and particularly what is the problem  (privacy) and one way it can be fixed using well-known IBE constructs without Zcash complications or cryptoNote ring signatures, as in aaquantum coin, as described, please call me for advice (travel & stay only, rest to US Social security, just tell me).