Monday, June 5, 2017

[Military AST]

[Military AST]

MID GRADE MILITARY AST - MODED AES SERPERNT AND TWOFISH CASCADE. A WEB BEACON THEN, BOOT AND NUKE WORM BETWEEN LAYERS. EXTREME KEY AND CYPHER BLOCK SIZE, (IN AS MAY LAYERS A THE TERMINAL CAN HANDEL. 20 TIMES LAYERS EACH.) WITH HASHCHECK AUTO-RESTORE INDESTRUCTIBLE CODE.

[Military  PGP] MODED PGP.
( IN AS MAY LAYERS A THE TERMINAL CAN HANDEL. 20 TIMES LAYERS EACH.) A WEB BEACON THEN, BOOT AND NUKE WORM BETWEEN LAYERS.
EXTREME KEY AND CYPHER BLOCK SIZE. WITH HASHCHECK AUTO-RESTORE INDESTRUCTIBLE CODE.

[SUPER COMPUTER AST]

SUPER COMPUTER AST - MODED AES SERPERNT AND TWOFISH CASCADE, A WEB BEACON THEN, BOOT AND NUKE WORM BETWEEN LAYERS. SUPER COMPUTER KEY LENGTH AND CYPHER BLOCK SIZE, (AS MUCH A THE TERMINAL CAN HANDEL. 10 TIMES EACH PROTOCOL.) WITH HASHCHECK AUTO-RESTORE INDESTRUCTIBLE CODE.

[SUPER COMPUTER PGP] MODED PGP.
( IN AS MAY LAYERS A THE TERMINAL CAN HANDEL. 20 TIMES LAYERS EACH.) A WEB BEACON THEN, BOOT AND NUKE WORM BETWEEN LAYERS.
SUPER COMPUTER KEY AND CYPHER BLOCK SIZE. WITH HASHCHECK AUTO-RESTORE INDESTRUCTIBLE CODE.


ON THE FLY AND ON THE FLY TRAFFIC.


[Military THORP CARD] - [Military AST] [Military  PGP]
[SUPER COMPUTER THORP CARD] - [SUPER COMPUTER AST] & [SUPER COMPUTER PGP]

Anonymity and security with end to end layered encryption.Round Robin, P2P, Onion Architecture. 3 nodes, expandable according to math . Perfect forward secrecy. A secure authentication scheme to be routed underneath. These are routed randomly. The duration of the circuits are at a per packet cycle, a new circuit is open on a per message basis. Only the sending node knows the circuit path taken there and the way back. This uses a AES, SERPENT and TWOFISH cascade as Symmetric Encryption for the the data passed. It also uses Extremely long key RSA as asymmetric Encryption/Decryption of the address to the next node. Only at the last node the Symmetric key for the Data on the path in question. Circuits looped three times through THORP (as a 9 node hop recommended).Udp AES encrypted packets with RSA encrypted muti-layered onion ip header. last sending header contains a symmetric AES key to unlock the AES encrypted bulk of the udp packet, As well as a symmetric AES key to for the return bulk of the packet. sending and receiving multiple node hops in each direction Determined by the sender. Routes are only known by the sender. Node simply strips away RSA encrypted Headers, Reads the next IP and sends. up until the last node in which the AES key is reveled.

To be hard coded into a series of chips and onto a FIBER OPTIC PCI-EXPRESS network interface card that directly interfaces onto the THORP Network. 443 port, dipped in black quick dry epoxy to keep reverse engineering, and water resistant. tamper proof.

No comments:

Post a Comment