A Unique Cipher? (A Derivation from the Morality Cube)

So one of the systems that has been incorporated into the project of Decayed Laurels is the morality system.  Instead of a binary axis system like Dungeons & Dragons with its notions of good vs. evil, and law vs. chaos.  I had concocted a trinary axis system which I shall detail publicly at a later date.  Anyways, onto the theme of this post.  This post is about a derivation of thought from the Morality Cube.  It is a potential cipher that I created out of boredom, and too much spare time.  I’ll illustrate the rules/methodology as follows;

Rules:

1. Each #value is its own discrete cube in 3d (or n-space).
2. Start at #value to be the origin.
  Ex; 0
3. Implement a growth seed, a #value that is not the same as origin value.
  Ex; 1
4. Growth seed value is added directly to origin value, and moved along an axis.
  Ex;     +Z     +Y
             1    1
               1  0  1     +X
                  1    1
5. The next level is generated by summing (...or multiplying….use some function) 
the adjacent 90 degree values.
  Ex;     +Z     +Y
             4    4
               1  1
             4 1  0  1  4 +X
                  1  1
                  4     4
6. The Diagonal Pocket values are generated by another function 
(summing, multiplication, division….etc). Worked upon the adjacent three 
values of the higher level.
  Ex;       +Z   +Y
               4  3  4
               3  1  1  3
               4  1  0  1  4 +X
                  3  1  1  3
                     4  3  4
7. The next area that needs filling is neither axis, nor Diagonal Pocket. 
Thus a Shift #value is needed. This value may be used for each subsequent level, or 
changed.
  Ex; Shift of 1.
                   +Y                                    +Z
                 5  4  5                               5  4  5
              5  3  1  3  5                         5  3  1  3  5
              4  1  0  1  4   +X                    4  1  0  1  4   +X
              5  3  1  3  5                         5  3  1  3  5
                 5  4  5                               5  4  5
8. Repeat steps 5 – 8 as desired to generate Scale. 
Scale is the overall size of the cipher pattern, and is determined 
by the number of axis levels modified by some function 
(sum of levels along one axis: mono direction: excluding Origin).
9. Thus a possible final cipher pattern could be.
  Ex;
                    +Y
                18  16  18
             5   5   4   5   5
        18   5   3   1   3   5   18
        16   4   1   0   1   4   16   +X
        18   5   3   1   3   5   18
             5   5   4   5   5
                18  16  18

                    +Z
                18  16  18
             5   5   4   5   5
        18   5   3   1   3   5   18
        16   4   1   0   1   4   16   +X
        18   5   3   1   3   5   18
             5   5   4   5   5
                18  16  18
10. Generate/Record Key that was used to create this pattern.
  Ex; 3d, 0, 1, Sum-90, 3Division-4, Shift 1, 3Division-4, Sum-90, Shift 2, Scale 3.
11. Encode Alphabets upon values.
  Ex;
                    +Y
                13   D   X
             R   5   B   K   V
         G   H   I   A   U   5   Z
         J   E   S   A   B   D   N   +X
         F   Q   P   G   O   5   O
             5   R   Y   S   T
                13   C   E

                    +Z
                 X   M   W
             Y   5   4   5   T
         I   5   L   1   Z   5   K
         J   E   S   A   B   D   N   +X
         L   5   W   H   N   P   J
             Q   5   4   V   U
                 M   C   F
12. Compose message using sequence Value, and Axes.
  Ex;
      Hello Brother.
5+Y-X, 13-Y+X, 3+Z-X, 13-Z-X, 13-Y+X – 1+X, 5-Y-X, 3-Y+X, 5+Z+X, 1-Z, 4-X, 5+Y-X.

In order to work, each party must use the same Generative Key to create pattern, and
the subsequent cipher of alphabets. The shared values in domains (X, Y, Z) 
ensure that there is “ambiguity”, and ideally should not contain the same letters 
in the same value. Eg; an H in multiple 5's in the 5+Y-X area (of which there are 
three 5's).

Ideas: Use multiple patterns to create message; have patterns “interface” where one
modifies the other to create the message. Subsets of patterns.

Quick Subset Ex; Origin Is B, but the pattern starts at 1. Send a “primer” 
to notify which pattern is used where.
  01110-0001101
  Quick Modify Ex;

                    +Y
                12   8  12
            10  15  12  15   10
        12  15   9   3   9   15  12
         8  12   3   1   3   12   8   +X
        12  15   9   3   9   15  12
            10  15  12  15   10
                12   8  12
Generation: 3d,1,2,Sum-90,3Div-4, Shift 3, 6Div-Sum-90, 3Div-3, Shift 4, Scale 3

                    +Z
                12   8  12
            10  15  12  15  10
        12  15   9   3   9  15  12
         8  12   3   1   3  12   8   +X
        12  15   9   3   9  15  12
            10  15  12  15  10
                12   8  12

Thus set up 1-0 to yield the message. (In this case 1-0 means subtract pattern 0 
from 1, but the same notation could mean whatever function upon party agreement).

                    +Z
                12   8  12
            10  15  12  15  10
        12  15   9   3   9  15  12
(1)     8   12   3   1   3  12   8   +X
        12  15   9   3   9  15  12
            10  15  12  15  10
                12   8  12

                    +Z
                13  12  13
             5   5   4   5   5
        13   5   3   1   3   5   13
(0)     12   4   1   0   1   4   12   +X
        13   5   3   1   3   5   13
             5   5   4   5   5
                13  12  13

                    +Z
                -1  -4  -1
             5  10   8  10   5
        -1  10   6   2   6  10  -1
(R)     -4   8   2   1   2   8  -4   +X
        -1  10   6   2   6  10  -1
             5  10   8  10   5
                -1  -4  -1

Thus R would be set up to have the alphabet encoding.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s