This is how to produce a Combary based Encryption routine from top to bottom.
Detect length and prevent continuing (and warn) if size is too small or too large (in bits).
I have considered it long and I need to allow testers to test a process alone.
First combination has binary appended left to right, second has it appended right to left.
We will be using the key differently for each MAIN PROCESS as well as the First Process.
The Juggle uses a system to break up code into a different format entirely.001001111010101110110110
To sum up: Iteration 1: 001111, Iteration 2: 00101, Iteration 3: 0
To sum up: Iteration 1: 001111110, Iteration 2: 00101110, Iteration 3: 0
To sum up: Iteration 1: 001111110110 , Iteration 2: 00101, Iteration 3: 0
It may be necessary to COUNT how many are in the final Substring and add that count to the HEADER
-----Only after the above stage has run all possible sub lengths into the various Iterations-----
Iteration 1: abcdefghijkl, Iteration 2 is mnopqrst and Iteration 3 is u.
When we are done ALL of the DATA FILE will be fitting in here
The final result would be abcdefghijkl u tsrqponm with no spaces. Do not worry it is completely readable when decrypting as explained down there.
The Sub Length actual length will be determined in part by this formula: (ROUNDDOWN(Log(total DATA FILE bits)/Log(2))) -4. If they try to cheat the DATA FILE size they will create an error here because minimum size...
To get our maximum number of triggers we use (ROUNDDOWN(Log(SubLengthValue)/Log(2))) /4. The absolute minimum is 2 Triggers however so any results under 2 need to be changed to 2. The formula here will be referred to as Y.
If the result is a 0: Then we will have four triggers at four bits each.
If the result is a 1: Then we will have three triggers at four bits and one trigger at three bits.
If the result is a 2: Then we will have two triggers at four bits and two triggers at three bits.
If the result is a 4: Then we will have two triggers at four bits and one trigger at two bits.
If the result is a 5: Then we will have one trigger at four bits and three triggers at three bits.
If the result is a 8: Then we will have one trigger at four bits and one trigger at two bits.
If the result is a 9: Then we will have three triggers at three bits.
If the result is a 10: Then we will have two triggers at three bits and one trigger at two bits.
If the result is a 11: Then we will have on trigger at one bit.
If the result is a 12: Then we will have one trigger at two bits.
If the result is a 13: Then we will have one trigger at three bits.
If the result is a 14: Then we will have two triggers at three bits.
The next step is determining what is the actual trigger value. We start with the SMALLEST SIZE(S).
Decrypting the Combinations is extremely easy and will not present any issues.
Decrypting this is a series of steps, do not advance a step until the previous one is fully finished
A quick example, our trigger will be 1 and substring size will be 3
100001010101110111 converts via encryption into (follow these steps:)
STEP 13: We have two bits remaining, from step's 11 and 12. In proper order they are 0 and 1.
STEP 14: Undo the reverse of temp file iteration two into 0000111.
STEP 15: Append iteration 1, 2, and 3 in proper order to get 100101111 0000111 01
just keep doing the iteration undoing... 1 means two next which was 00, that is our first substring.
{1}00101111 {00}00111 01 therefore would be our first substring in visual
(1){001}01111 (00)00111 01 now gets 001 for the second substring [100,001]
(1)(001){01}111 (00){0}0111 01 now gets 01 and 0 for the third substring [100,001,010]
(1)(001)(01){1}11 (00)(0){01}11 01 now gets 001 for the fourth substring [100,001,010,101]
(1)(001)(01)(1){1}1 (00)(0)(01){1}1 {0}1 now gets 101 for the fifth substring [100,001,010,101,110]
If the result is a 0: Then we will have four triggers at four bits each.
If the result is a 1: Then we will have three triggers at four bits and one trigger at three bits.
If the result is a 2: Then we will have two triggers at four bits and two triggers at three bits.
If the result is a 4: Then we will have two triggers at four bits and one trigger at two bits.
If the result is a 5: Then we will have one trigger at four bits and three triggers at three bits.
If the result is a 8: Then we will have one trigger at four bits and one trigger at two bits.
If the result is a 9: Then we will have three triggers at three bits.
If the result is a 10: Then we will have two triggers at three bits and one trigger at two bits.
If the result is a 11: Then we will have on trigger at one bit.
If the result is a 12: Then we will have one trigger at two bits.
If the result is a 13: Then we will have one trigger at three bits.
If the result is a 14: Then we will have two triggers at three bits.
The next step is determining what is the actual trigger value. We start with the SMALLEST SIZE(S).
The salts can be applied to change the key, to change the combination length, to change the binary value creating the combination, to change which ternary value is the combination, to change the binary added to the combination, and to prevent combinations entirely.
All Salts are called with a 1 taken from the key, a 0 indicates no salt
Let me know if you think this can be done without issue, I suspect it can.
This is based upon Patent and Patent Pending materials, all rights reserved.
My email is Michaelhh@gmail.com and please include something about the Patents in your title.
The law firm handling my Patent Filings is: Nolte Lackenbach Siegel
The first effort to use binary to store data is commonly attributed to Gottfried Leibniz but it was Thomas Hariot who in fact used a Binary to Decimal system and discovered how binary could store numbers
Therefore in context, as Binary and Ternary were created around 1646-1716 by Thomas Hariot, Combary is the first actual advance in this numbering field in over 400 years.