Trial Python and Matlab AES-GCM and ChaCha20 Computational Function Transformation (CFT) Programs

Testing, Education, and Research Only of potentially 10^500 variations

CFT is a transformation of a computational function that preserves the underlying architecture. The number of potential variations in CFTed functions is insanely large. Depending on the selected parameters ranging between 10^500 and 10^150,000. These numbers are almost absurdly large. The provided programs allow you to be familiarized with some of the simple but powerful CFT transformations. The free programs are protected by issued and pending US Patents.

Users are granted a limited license to use these programs strictly for private use, education, testing, and research purposes only.

We claim an increase of security in existing encryption by Encryption Cloaking up to a factor 10150,000 or even higher. Yes, we know, this is an insanely large number. This is supported by simple combinatorial math.

The easy to install and execute Python and MatLab programs are listed below and links are provided.

The AES-GCM and Chacha20 programs, below, are for encrypting/decrypting of direct text only. Not for files, in these versions. However, the programs were tested and are believed to be in compliance with the FIPS-800-38A test vectors for AES-CTR. We tested the programs and believe that when used properly encrypted data may be decrypted. However, no guarantee/warranty is provided for any useful operation of the programs. You use them at your own risk.

No Warranties

These programs are provided "as is" with no guarantees of functionality or support. The working of the programs has been tested on Dell and HP Windows machines.

Warning

The provided encryption methods are extremely powerful. Please, don't be fooled by the simple looking modification. They are at least as powerful as their unmodified base methods, and actually more so. Be aware that there is no way for us to recover data encrypted by these programs. If you lose or overwrite critical encryption parameters, we cannot assist in data recovery. You are solely responsible for maintaining your encryption parameters, keywords and iv.

Limited License to Use the Programs

You are granted a very limited license to use these programs strictly for private use, education, testing, and/or research. You do not have any license or permission to operationally use, or sell, distribute, export, or incorporate the patent-protected aspects of the software. Each downloaded program may be installed on a single machine, which must obtain each program from this website. Usage for creating any type of secure storage, communication, and/or authentication is not allowed.

Paid User Licensing

1. Individual License — $259 (as of January 25, 2026)

A one-time, lifetime license for a single identifiable individual.

Included:

There are no recurring royalties and no per-transaction fees.

2. Institutional & Server Licensing

For commercial deployment or networked environments:

3. Discretionary Licensing & Public Notice

To protect the integrity of our technology, we reserve the right to deny licenses at our discretion. This ensures responsible deployment and prevents misuse of our patented methods. We also reserve the right to adjust licensing fees at any time and without prior notice.

Additionally, the patent portfolio may be sold or transferred to another party, whose licensing terms, pricing, and conditions may differ from those currently offered.

The “Threat-Is-In-the-Future” Problem

Current symmetric standards — AES-GCM/CTR and ChaCha20 — are approaching the natural end of their cryptographic life cycle. AES is nearly 30 years old; ChaCha20 is not far behind. Both rely on deterministic, XOR-based structures that were never designed for an era of:

It is unrealistic to assume that while PKI faces existential pressure, symmetric ciphers will remain indefinitely immune.

The Threat vs. The Torrent — A Fair Warning

As long as the threat remains abstract, alternatives appear unnecessary. But once credible indications emerge that AES or ChaCha20 are compromised, demand for a drop-in, implementation-ready bridge will surge.

We pre-announce that individual license pricing may reach $999 under such conditions. This is not opportunistic pricing — it reflects market dynamics and the criticality of immediate migration paths.

We disclose this now to ensure all parties are fully informed.

Free Evaluation Software

We provide fully functional, ready-to-run programs for exhaustive testing. They may not be used operationally, but they allow organizations to evaluate performance, compatibility, and implementation agility at no cost.

Cost of Compliance vs. Cost of Infringement

For enterprise environments, the cost of legitimate licensing — even at scale — is minimal compared to:

Our pricing is intentionally structured to make lawful adoption the rational choice.

The Implementation-Agile Bridge

There is currently no standardized fallback should AES or ChaCha20 experience a sudden cryptographic failure. Most organizations lack the ability to replace foundational primitives on short notice.

Our patented CFT-based methods provide the only immediate, drop-in bridge — replacing linear XOR transforms with non-linear, n-state inverters that eliminate deterministic structural weaknesses.

This is not merely an alternative. It is the contingency plan the ecosystem currently lacks.

The Free Programs in Python and Matlab

Program Access

The purpose of this website is to provide easy access to test and review the proposed modifications explained in the patents. We provide here Python and Matlab coded programs.

  • In Python: AES-GCM (FLT Modified): Replaces bitwise XOR with an addition over GF(256) and later with a patent protected functional transformation. Download Zip File aesgcmfltPython.zip
  • In Python: AES-GCM (Radix Modified): Applies a radix-256 functional transformation. Download Zip File aesgcmradPython.zip
  • In Python: ChaCha20 (FLT Modified): Applies a functional transformation of a table characterized as an addition over GF(256). Download Zip File chacha20fltpython.zip
  • In Python: ChaCha20 (Radix Modified): Applies a functional transformation of a 256-state carry table . Download Zip File chacha20radpython.zip
  • AES-GCM in Matlab (Unmodified): Developed and posted by David Hill, with no copyright limitations. There are two ways to easily obtain the program. First way: download from MathWorks Website. Second way: Downloading requires sign-in to Mathworks. However, you can also go to the above link and click on the "Functions" tab, which shows a list of functions in AES-GCM. You can copy the script and paste in local files, saving it as named on top of the script with .m extension. Like: click on function: Cipher. Copy the script. Paste in Notepad. Save as Cipher.m. Do this for all functions and save in common folder.
  • AES-GCM in Matlab (Modified): Replaces bitwise XOR with an addition over GF(256). Patent protected. Ten different 256-state tables are included. This also implements the standard AES-GCM routine, when inserting 'sc256' as input. Download Zip File AESflt.zip
  • AES-GCM in Matlab (Radix-256 Addition): Uses radix-256 addition and includes ten 256-state carry tables and two 256-state tables of reversible involutions. Patent pending. This version also implements the standard AES-GCM routine, when as input selected 'sc256' and 'car256neut'. Download Zip File AESfltrad.zip
  • All programs come with full instructions in .zip. Unzip/extract into a common folder and read the instructions in readme.txt. You may be surprised to find that the transformation is merely a small set of instructions. We also offer modified ChaCha20 encryption programs.

    MATLAB and Octave

    The programs have been developed in an older version of MATLAB as released by The MathWorks, Inc. The Matlab programs are believed to be executable as is (or with minor adjustment) by GNU Octave, a free development platform available from https://www.octave.org/.

    Contact

    Contact us at info@labcyfer.com for more information.

    Patents

    Useful Articles