To have insight in how datastores may have been ecrypted on
for some situations it may be needed to have a detailed document that may be encrypted with a novel mechanism -
- which versions methods cascades of cryptographic functions were applied to encrypt the data
- it is less obvious to mention that the cryptographic functions were in software and bootstrapped from the same host system entropy pool (scrambled jitter)
perhaps this document can be accessed with a zero-knowledge proof capsule that I will make for it
before QR there may be some actions needed to be able to beef up the cryptographic functions in use,
we may need to be able to harden the cryptographic functions by secured fenced scheduled re-seeding re-nonce in a nonlinear way or we make it microprogrammable
for this I have a design that bootstraps itself in new novel way, to have a non-blocking Unix Character Device /dev/entropy that has access to the configuration that applies for xyz system encryption target
this was a pet project of mine, nobody was interested at the time that binary got dissected with a failing QR alternative but a successive Qbit Quantum program the binary data could be dissected and reconstructed cipher key passwords, protocol layer security - in 2022 in 2023 there are RNG methods that are maximum entropy equilibrium - that defeat nearly all cryptographic functions that need to conform or rely on FIPS margins of 1/0 distribution conform NIST test suites for P - this is no longer actual - advancements in entropy complexity modulation is likely a better QR solution yet to be tested in the NIST contest
------------------------------
Edwin Jean-Paul Vening Architect of Cryptography
Architect of Cryptography
Datamorgana Data Labs | Life Sciences and Magic
Netherlands
------------------------------