Fractal Transformation Demo

This demo implements Fractal Transformation using our Fractal Encryption Standard (FES).

You can edit the key and payload as desired, and click Transform to see the cipher in Base64.

Once a cipher is present an Extract button can be clicked to reverse the transformation.

Any change to the key, cipher or options will fail to Extract.

Also see the Visual Fractal Transformation Demonstration.

FES Encryption
Key
Payload
Transform
Cipher


Base64

Transformation Options
Fractal OTP
FES Silo
Key Space
Passes
Overwrite
Scramble

Options Security

FES delivers all available options seamlessly, they will function in any combination.

Fractal Transformation options and defaults are optional.

The default set of options, e.g. just XOR overwrite, are impenetrable and quantum-proof due the quality of fractal streams, making the system secure even without additional transformations.

Security Levels

FES options deliver powerful security layers and levels that you can combine according to requirements.

Levels:

  1. General Purpose: Key-Space 896, Single Pass, xor
  2. Important Documents: Key-Space 3,584, 3 passes, sub, xor,add, bit split
  3. Critical Documents: Key-Space 14,336, 4 passes, sub, xor,add, bit split, Scramble
  4. Top Secret: Key-Space 57,344, 7 passes, fBlit, sub, xor,add, bit split, bit warp, Scramble

Bitwise transformations fBlit and bit warp are more expensive processing wise, but deliver exceptional security layers.

Fractal OTP

Fractal OTP is optional.

The Fractal OTP allows you to enter meta-data to generate unique Fractal Streams that meet the Shannon One Time Pad (OTP) requirement that a key can only be used once.

When supplied, FES uses Fractal OTP to navigate from the Key Portal to a second OTP Portal, using the string entered.

The Fractal OTP is also Silo sensitive, so the FES Fractal Stream (equates to Shannon's OTP key) is unique to the Key/OTP/Silo combination (and the other options).

For file and document encryption you can enter the full File path of the document, for communications you can use Session IDs or time-stamps.

FES Silo

The FES Silo selector sets one of four example Compartmentalisation Silos.

An organisation can generate an unlimited number of unique Silos, and the ones listed are a sample set to demonstrate encryption level compartmentalization.

To test, Transform using one Silo and Extract using another to verify failed extraction.

Each Silo is in effect an entirely unique encryption algorithm.

Unlimited Key Space

The Key Space selector sets the total number of bits used for the key.

Required Key Space precision is achieved by expanding the number of Mandelbrot dimensions, each dimension adding 112 bits of precision. There is no conceptual limit to the size of the Key Space; it has been tested to 4,480,000 bits (limited to 57,344 bits here).

Fractal Transformation Precision

Transformation Precision is the same as the Key Space selected.

The Transformation Precision is achieved by scaling the number of Mandelbrot Dimensions. The possible number of Mandelbrot Dimensions is logically unlimited, limits are imposed by hardware memory and processors. Up to 40,000 dimensions have been tested, but in practical terms 512 dimensions is a likely maximum with a 57,344 bit key space.

Key Space identifies a multi-dimensional fractal portal. The Key is then discarded and does not act on the payload.

The payload is then transformed by an infinitely complex multi-dimensional fractal stream that emerges from the portal, using the same Fractal Precision.

Passes

The Passes selector sets the number of fractal transform passes applied to the payload.

As the unique and infinitely complex Fractal Stream size is unlimited, it is extended to match the payload size x number of passes, continuing to transform the payload with as many passes as desired (limited to 7 passes here) with infinite and unique fractal complexity.

Scramble

Scramble activates cipher byte scramble using fractal value order.

The order is assembled from core fractal values during Fractal Stream generation.

Scramble is unique for each pass.

Overwrite

You can select one or more Overwrite Functions that overwrite the payload with the Fractal Stream:

  1. fBlit: Bitwise fractal stream driven scramble.
  2. sub: Fractal driven byte substitution.
  3. xor: The default bit-wise cryptographic operator.
  4. add: The payload and fractal stream byte values are added.
  5. byte split: Bytes are bit-split according to fractal stream values.
  6. bit warp: Bit segments are sequentially selected and split according to fractal stream.

Each selected Overwrite Function shifts, swaps, and overwrites in byte and bit aligned modes, submerging the payload in the fractal stream, the payload ceases to exist.

Bit-split delivers additional diffusion and non-linearity. It should be used in combination with another function.

Copyright © 2025
All Rights Reserved
Contact:
[email protected]
scroll to top of page