Thursday, December 28, 2017

The aalan weltanschaung - height of crypt-dream


The following is height of crypt-dream outline of becoming the richest man in world, profoundest intellectual so far on earth, and how to bootstrap to it. It is believable but provably useless for anything but belief test! It is long, logical, absurd but fun imagination. I sincerely believe in it.

My generic blockchain world has consumers (or consumer agents) and Miners, A pair of consumers called the giver Alice and getter Bob wish transmission of entity product through some miner representative agent who interacts with other miners and maintains a distributed ledger. It is assumed that there is allies that wish to ensure taxes are paid and can do warrantful decryption by force. There is also many evil easvesdropper Eve and evil modifiers Malloy who might subvert arbitrary miners. For understanding, consider coins from giver to getter.

Aalan

Unlike other languages, syntax is not a matter of choice but existing inadequacies. Eventually it is designed to win compulsorily – it provides the best of all others and is currently the only way to get these

1.       Library primitives to privacy preserving blockchain
2.       System-level efficient multiple inheritance
3.       Non-deterministic programming

As well as ideas from other contemporary great efforts of

1.       Concurrency from Go
2.       No linguistic garbage collection from Rust
3.       First class scope from angular js
4.       Functional operations from shell
5.       First class function values from javascript
6.       Multiple simultaneous error returns from Go

And small but crucial syntactic sugars of

1.       () versus {}
2.       Arguments by category
3.       Meaningful compaction

Rest is overview of the implementation goals and why!

Doubt 1 – As stated, there is NO solution!

Reply 1 – For NO one on earth but me. Think of practical cases. Suppose a Canadian firm allowed undecodable encryptions. Indian police would be rightfully upset as it would be also used by every criminal! So they would demand forced decryption with proper warrants. Possible if the secrets of the encryption field were given. Such a doing by Canadian company gives India police enormous powers of forced decryption of all else, no Canadian need later, never mind corrupt folks in Indian police later! So Canadian company says no. So Indian police convinces GOI to banish products of this company!

Similar scenarios have happened. No police can allow unbreakable encryption. Feds v. Apple was so. Enormous number of users can be mis-decrypted by state or an enemy using one turncoat. China USA is big battle. How can I do it, uniquely bypass the lacuna?! By having nearly as many encryption fields as the number of some multiple of consumers! By changing every field every year or month or week!

Doubt 2 – There are plenty of smart encryption fellows!

Reply 2 – One must consider security and privacy, a tension throughout human history. No privacy leads to big brother and tyrants of one kind; while total privacy leads to crime, underage sexuality, cannibalism, destability and tyrants of other kind. The USA solution is greatest approximation with strict warrant-ful control on breach of privacy! One can never allow unbreakable encryption. But every exposure of the field parameters leads to turncoats and destruction of other people privacy.

The only solution to this conundrum is as many IBE encryption fields as members or more. It is easy for me, impossible for others! And no one on earth can do what I can!
Among other applications, I can build unlie-able trademarks, untappable phone conversations, guaranteed secure mail, unusable if pirated video etc.

Doubt 3 – There is no way to bootstrap!

Reply 3 - Beyond some point, my empire will grow from money raised internally from products sold. How does one get to self-growth point? Especially if I have deep doubts about business acumen of self! The answer is venture capitalists, who must have a convincing demo. So that is job1. But how?
If I gave away my root extraction, that is crown jewels! But wait a minute! A toy implementation on 16 bit bignums can be made that does only operations on 16 bits now, but can work for 1000 bit primitives directly!

This simulation is not done yet! What about square root which will leak even from toy implementation! However for 16 bits, one can do something impossible for 1000 bits – make a table of square roots! There are 64K numbers. So one can make them for 1-9 people in the world for half a million element tables. Anyone can ask for square root of any number in family semi-prime and it is just a table lookup!

In fact, I solve the problem of impossible bugs in my 1000 bit arithmetic! The toy requires simple 32 bit operations. In fact, difficulty for evil in my world can be appreciated by 64 bit arithmetic!

Enormous development

One utterly remarkable upshot of this documentation is that not only does it present very simple and convincing outline to blockchain that is central to new-21, along with many other encryptions, it is all based on a problem only I can solve on earth! What is more, demonstration programs can be built that simulate this primitive and all essential user code can be open source without empowering competitors in any way! Even this property can be demonstrated! So let me expose nearly everything, also nothing!

Only secret, earth-wide, that I have is computation of square roots of 1000 to 10,000 bit integers, modulo semi-prime. Computation of squares is easy and requires very little hardware. Hence checking a square root is cheap. But computing it is exponentially hard.. Simulation for a small integer, 16 bit, is easy as all the squares can be enumerated. One can make all things discussed here, except root calculations, open source. In turn, the software can be built using copy-left. The square root extraction can be done secretly inside protected hardware. The results can be checked.
Nearly half the numbers to a (semi-prime n : a/log n) are modulo squares. For 1024 bit integers, 1013 bit numbers are. This means 1013 bit keys are available!

TO USE ENCRYPTION THAT IS IMMUNE TO ADAPTIVE AND QUANTUM ATTACKS, one uses a double encryption – outer-quantum-computer-proof-inner-my-IBE. Knowledge-able will correctly guess the details. For all else

Encryption (Message-1gb, key-1024, Alice-private-data, Bob-public-data) => eMessage-1gb+10%, key-square-1024, more-3000
Decryption (eMessage-1gb+, sqrt-key-1024, Bob-private-data, Alice-public-data) => message

To send encrypted to bob, encrypt message using consumer-choice- key and send the encrypted with key material. Provided I secretly send back the sqrt (after authentication) decryption happens. Bob does not care about how I did, sends me asked square encrypted and I answer sqrt encrypted.
The sqrt is required in this scheme! It can be cheaply checked. But NOT extracted. The quantum computer enclosure is needed. Much smaller key-material can replace it with OAEP+ RSA. However New-Hope-Simple is fast enough.

Two semi-prime protocol aa2

I have built my IBE around two semi-prime, one whose factors I know and one I don’t! This allows messages undecode-able by me to be passed. Imagine a nation where Alice resides. It may require key escrow deposit before the semi-prime can be used. The message is still secret to me. Associated with any allowed semi-prime is a signature which must be attached by any sender. False attachment is Warrant-evade crime! Police permit properly escrowed semi-prime, fail only with warrants, detected reliably and receiver punished without further cause. False entrapment fixable. My semi-prime only eliminates man-in-the-middle by providing identity proof!

Let us call escrow deposit and signature process registration. Sender needs to register in the destination, while the destination must be registered in own nation. The sender might be required to send copy to self of all external mail. This allows warrant in send and receive jurisdictions. Eve and Malloy are useless.

The aa2 allows the destruction of any address without exposing any previous mails! It is done causelessly to automatically destroy any leaks every year or faster. Any address may be destroyed at once for cause. In one application, locks are changed whenever an employee e leaves in all locations where e might have a key!

Signatures

Trademarks are essential but enter extra costs. Clearly, provider is interested in enforcing trademarks while consumer wants the quality but not have the extra cost. Legal method is attaching symbols and distinctive containers to products. Breach is done by false copies of marks to malicious smuggling.
It may be to goods, even money. Suppose every nation had a semi-prime. All the notes would have a field from which a uni1que serial number was extracted. It would be followed by square root. A local check can be made that the serial number is genuine and that the square root squared reproduces the serial. This is a fool-proof local check to devastate Pakistan! Same works for Gucci making bags. Trademarks in general. What can be better than eliminating the criminal PTO of USA!

Another is automatic fee payment to continue encryption address beyond current year.
In one application, banknotes lose value fully every year – they must be exchanged in banks every year after a record is made. The record itself may be encrypted to allow signatured recorded permitted access only. One can reap demonetization benefits without one!


Apart from becoming the richest, a number of warrant-ful applications can only be possible in my encryption! USA judges complain incessantly about use/abuse of privacy by suspect’s lawyers! Civilization forward is the continuous battle between privacy and security. Only I have technological not legal ideas – one you can breach, others you cannot!

No comments:

Post a Comment