So one of the systems that has been incorporated into the project of Decayed Laurels is the morality system. Instead of a binary axis system like Dungeons & Dragons with its notions of good vs. evil, and law vs. chaos. I had concocted a trinary axis system which I shall detail publicly at a later date. Anyways, onto the theme of this post. This post is about a derivation of thought from the Morality Cube. It is a potential cipher that I created out of boredom, and too much spare time. I’ll illustrate the rules/methodology as follows;

Rules: 1. Each #value is its own discrete cube in 3d (or n-space). 2. Start at #value to be the origin. Ex; 0 3. Implement a growth seed, a #value that is not the same as origin value. Ex; 1 4. Growth seed value is added directly to origin value, and moved along an axis. Ex; +Z +Y 1 1 1 0 1 +X 1 1 5. The next level is generated by summing (...or multiplying….use some function) the adjacent 90 degree values. Ex; +Z +Y 4 4 1 1 4 1 0 1 4 +X 1 1 4 4 6. The Diagonal Pocket values are generated by another function (summing, multiplication, division….etc). Worked upon the adjacent three values of the higher level. Ex; +Z +Y 4 3 4 3 1 1 3 4 1 0 1 4 +X 3 1 1 3 4 3 4 7. The next area that needs filling is neither axis, nor Diagonal Pocket. Thus a Shift #value is needed. This value may be used for each subsequent level, or changed. Ex; Shift of 1. +Y +Z 5 4 5 5 4 5 5 3 1 3 5 5 3 1 3 5 4 1 0 1 4 +X 4 1 0 1 4 +X 5 3 1 3 5 5 3 1 3 5 5 4 5 5 4 5 8. Repeat steps 5 – 8 as desired to generate Scale. Scale is the overall size of the cipher pattern, and is determined by the number of axis levels modified by some function (sum of levels along one axis: mono direction: excluding Origin). 9. Thus a possible final cipher pattern could be. Ex; +Y 18 16 18 5 5 4 5 5 18 5 3 1 3 5 18 16 4 1 0 1 4 16 +X 18 5 3 1 3 5 18 5 5 4 5 5 18 16 18 +Z 18 16 18 5 5 4 5 5 18 5 3 1 3 5 18 16 4 1 0 1 4 16 +X 18 5 3 1 3 5 18 5 5 4 5 5 18 16 18 10. Generate/Record Key that was used to create this pattern. Ex; 3d, 0, 1, Sum-90, 3Division-4, Shift 1, 3Division-4, Sum-90, Shift 2, Scale 3. 11. Encode Alphabets upon values. Ex; +Y 13 D X R 5 B K V G H I A U 5 Z J E S A B D N +X F Q P G O 5 O 5 R Y S T 13 C E +Z X M W Y 5 4 5 T I 5 L 1 Z 5 K J E S A B D N +X L 5 W H N P J Q 5 4 V U M C F 12. Compose message using sequence Value, and Axes. Ex; Hello Brother. 5+Y-X, 13-Y+X, 3+Z-X, 13-Z-X, 13-Y+X – 1+X, 5-Y-X, 3-Y+X, 5+Z+X, 1-Z, 4-X, 5+Y-X. In order to work, each party must use the same Generative Key to create pattern, and the subsequent cipher of alphabets. The shared values in domains (X, Y, Z) ensure that there is “ambiguity”, and ideally should not contain the same letters in the same value. Eg; an H in multiple 5's in the 5+Y-X area (of which there are three 5's). Ideas: Use multiple patterns to create message; have patterns “interface” where one modifies the other to create the message. Subsets of patterns. Quick Subset Ex; Origin Is B, but the pattern starts at 1. Send a “primer” to notify which pattern is used where. 01110-0001101 Quick Modify Ex; +Y 12 8 12 10 15 12 15 10 12 15 9 3 9 15 12 8 12 3 1 3 12 8 +X 12 15 9 3 9 15 12 10 15 12 15 10 12 8 12 Generation: 3d,1,2,Sum-90,3Div-4, Shift 3, 6Div-Sum-90, 3Div-3, Shift 4, Scale 3 +Z 12 8 12 10 15 12 15 10 12 15 9 3 9 15 12 8 12 3 1 3 12 8 +X 12 15 9 3 9 15 12 10 15 12 15 10 12 8 12 Thus set up 1-0 to yield the message. (In this case 1-0 means subtract pattern 0 from 1, but the same notation could mean whatever function upon party agreement). +Z 12 8 12 10 15 12 15 10 12 15 9 3 9 15 12 (1) 8 12 3 1 3 12 8 +X 12 15 9 3 9 15 12 10 15 12 15 10 12 8 12 +Z 13 12 13 5 5 4 5 5 13 5 3 1 3 5 13 (0) 12 4 1 0 1 4 12 +X 13 5 3 1 3 5 13 5 5 4 5 5 13 12 13 +Z -1 -4 -1 5 10 8 10 5 -1 10 6 2 6 10 -1 (R) -4 8 2 1 2 8 -4 +X -1 10 6 2 6 10 -1 5 10 8 10 5 -1 -4 -1 Thus R would be set up to have the alphabet encoding.

Advertisements