Testing, Education, and Research Only of potentially 10^500 variations
CFT is a transformation of a computational function that preserves the underlying architecture. The number of potential variations in CFTed functions is insanely large. Depending on the selected parameters ranging between 10^500 and 10^150,000. These numbers are almost absurdly large. The provided programs allow you to be familiarized with some of the simple but powerful CFT transformations. The free programs are protected by issued and pending US Patents.
Users are granted a limited license to use these programs strictly for private use, education, testing, and research purposes only.
We claim an increase of security in existing encryption by Encryption Cloaking up to a factor 10150,000 or even higher. Yes, we know, this is an insanely large number. This is supported by simple combinatorial math.
The easy to install and execute Python and MatLab programs are listed below and links are provided.
The AES-GCM and Chacha20 programs, below, are for encrypting/decrypting of direct text only. Not for files, in these versions. However, the programs were tested and are believed to be in compliance with the FIPS-800-38A test vectors for AES-CTR. We tested the programs and believe that when used properly encrypted data may be decrypted. However, no guarantee/warranty is provided for any useful operation of the programs. You use them at your own risk.
No Warranties
These programs are provided "as is" with no guarantees of functionality or support. The working of the programs has been tested on Dell and HP Windows machines.
Warning
The provided encryption methods are extremely powerful. Please, don't be fooled by the simple looking modification. They are at least as powerful as their unmodified base methods, and actually more so. Be aware that there is no way for us to recover data encrypted by these programs. If you lose or overwrite critical encryption parameters, we cannot assist in data recovery. You are solely responsible for maintaining your encryption parameters, keywords and iv.
You are granted a very limited license to use these programs strictly for private use, education, testing, and/or research. You do not have any license or permission to operationally use, or sell, distribute, export, or incorporate the patent-protected aspects of the software. Each downloaded program may be installed on a single machine, which must obtain each program from this website. Usage for creating any type of secure storage, communication, and/or authentication is not allowed.
A one-time, lifetime license for a single identifiable individual.
There are no recurring royalties and no per-transaction fees.
For commercial deployment or networked environments:
To protect the integrity of our technology, we reserve the right to deny licenses at our discretion.
This ensures responsible deployment and prevents misuse of our patented methods. We also reserve the right to adjust licensing fees at any time and without prior notice.
Additionally, the patent portfolio may be sold or transferred to another party, whose licensing terms, pricing, and conditions may differ from those currently offered.
Current symmetric standards — AES-GCM/CTR and ChaCha20 — are approaching the natural end of their cryptographic life cycle. AES is nearly 30 years old; ChaCha20 is not far behind. Both rely on deterministic, XOR-based structures that were never designed for an era of:
It is unrealistic to assume that while PKI faces existential pressure, symmetric ciphers will remain indefinitely immune.
As long as the threat remains abstract, alternatives appear unnecessary. But once credible indications emerge that AES or ChaCha20 are compromised, demand for a drop-in, implementation-ready bridge will surge.
We pre-announce that individual license pricing may reach $999 under such conditions. This is not opportunistic pricing — it reflects market dynamics and the criticality of immediate migration paths.
We disclose this now to ensure all parties are fully informed.
We provide fully functional, ready-to-run programs for exhaustive testing. They may not be used operationally, but they allow organizations to evaluate performance, compatibility, and implementation agility at no cost.
For enterprise environments, the cost of legitimate licensing — even at scale — is minimal compared to:
Our pricing is intentionally structured to make lawful adoption the rational choice.
There is currently no standardized fallback should AES or ChaCha20 experience a sudden cryptographic failure. Most organizations lack the ability to replace foundational primitives on short notice.
Our patented CFT-based methods provide the only immediate, drop-in bridge — replacing linear XOR transforms with non-linear, n-state inverters that eliminate deterministic structural weaknesses.
This is not merely an alternative. It is the contingency plan the ecosystem currently lacks.
The purpose of this website is to provide easy access to test and review the proposed modifications explained in the patents. We provide here Python and Matlab coded programs.
All programs come with full instructions in .zip. Unzip/extract into a common folder and read the instructions in readme.txt. You may be surprised to find that the transformation is merely a small set of instructions. We also offer modified ChaCha20 encryption programs.
The programs have been developed in an older version of MATLAB as released by The MathWorks, Inc. The Matlab programs are believed to be executable as is (or with minor adjustment) by GNU Octave, a free development platform available from https://www.octave.org/.