This demo implements Fractal Transformation using our Fractal Encryption Standard (FES).
You can edit the key and payload as desired, and click Transform to see the cipher in Base64.
Once a cipher is present an Extract button can be clicked to reverse the transformation.
Any change to the key, cipher or options will fail to Extract.
Also see the Visual Fractal Transformation Demonstration.
FES delivers all available options seamlessly, they will function in any combination.
Fractal Transformation options and defaults are optional.
The default set of options, e.g. just XOR overwrite, are impenetrable and quantum-proof due the quality of fractal streams, making the system secure even without additional transformations.
FES options deliver powerful security layers and levels that you can combine according to requirements.
Bitwise transformations fBlit and bit warp are more expensive processing wise, but deliver exceptional security layers.
Fractal OTP is optional.
The Fractal OTP allows you to enter meta-data to generate unique Fractal Streams that meet the Shannon One Time Pad (OTP) requirement that a key can only be used once.
When supplied, FES uses Fractal OTP to navigate from the Key Portal to a second OTP Portal, using the string entered.
The Fractal OTP is also Silo sensitive, so the FES Fractal Stream (equates to Shannon's OTP key) is unique to the Key/OTP/Silo combination (and the other options).
For file and document encryption you can enter the full File path of the document, for communications you can use Session IDs or time-stamps.
The FES Silo selector sets one of four example Compartmentalisation Silos.
An organisation can generate an unlimited number of unique Silos, and the ones listed are a sample set to demonstrate encryption level compartmentalization.
To test, Transform using one Silo and Extract using another to verify failed extraction.
Each Silo is in effect an entirely unique encryption algorithm.
The Key Space selector sets the total number of bits used for the key.
Required Key Space precision is achieved by expanding the number of Mandelbrot dimensions, each dimension adding 112 bits of precision. There is no conceptual limit to the size of the Key Space; it has been tested to 4,480,000 bits (limited to 57,344 bits here).
Transformation Precision is the same as the Key Space selected.
The Transformation Precision is achieved by scaling the number of Mandelbrot Dimensions. The possible number of Mandelbrot Dimensions is logically unlimited, limits are imposed by hardware memory and processors. Up to 40,000 dimensions have been tested, but in practical terms 512 dimensions is a likely maximum with a 57,344 bit key space.
Key Space identifies a multi-dimensional fractal portal. The Key is then discarded and does not act on the payload.
The payload is then transformed by an infinitely complex multi-dimensional fractal stream that emerges from the portal, using the same Fractal Precision.
The Passes selector sets the number of fractal transform passes applied to the payload.
As the unique and infinitely complex Fractal Stream size is unlimited, it is extended to match the payload size x number of passes, continuing to transform the payload with as many passes as desired (limited to 7 passes here) with infinite and unique fractal complexity.
Scramble activates cipher byte scramble using fractal value order.
The order is assembled from core fractal values during Fractal Stream generation.
Scramble is unique for each pass.
You can select one or more Overwrite Functions that overwrite the payload with the Fractal Stream:
Each selected Overwrite Function shifts, swaps, and overwrites in byte and bit aligned modes, submerging the payload in the fractal stream, the payload ceases to exist.
Bit-split delivers additional diffusion and non-linearity. It should be used in combination with another function.
![]() |
Copyright © 2025 All Rights Reserved |
Contact: [email protected] |