<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: marcos n</title>
    <description>The latest articles on DEV Community by marcos n (@mark_id752).</description>
    <link>https://dev.to/mark_id752</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3920910%2F2340d18b-6e7c-4662-8301-399844a734db.png</url>
      <title>DEV Community: marcos n</title>
      <link>https://dev.to/mark_id752</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mark_id752"/>
    <language>en</language>
    <item>
      <title>Building an Experimental TypeScript Cipher Inspired by 8 Dimensions</title>
      <dc:creator>marcos n</dc:creator>
      <pubDate>Sat, 09 May 2026 01:33:07 +0000</pubDate>
      <link>https://dev.to/mark_id752/building-an-experimental-typescript-cipher-inspired-by-8-dimensions-3fno</link>
      <guid>https://dev.to/mark_id752/building-an-experimental-typescript-cipher-inspired-by-8-dimensions-3fno</guid>
      <description>&lt;p&gt;Over the last few days, I started an experimental study on cryptography with the goal of better understanding concepts such as &lt;strong&gt;symmetric encryption&lt;/strong&gt;, &lt;strong&gt;S-Boxes&lt;/strong&gt;, &lt;strong&gt;nonces&lt;/strong&gt;, &lt;strong&gt;diffusion&lt;/strong&gt;, &lt;strong&gt;confusion&lt;/strong&gt;, &lt;strong&gt;permutation&lt;/strong&gt;, &lt;strong&gt;avalanche effect&lt;/strong&gt;, &lt;strong&gt;key derivation&lt;/strong&gt;, and &lt;strong&gt;message authentication&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;From this study, I started working on an experimental idea called:&lt;/p&gt;

&lt;h2&gt;
  
  
  Tesseract-8D/128
&lt;/h2&gt;

&lt;p&gt;The idea behind &lt;strong&gt;Tesseract-8D/128&lt;/strong&gt; is to explore an experimental encryption model where each byte of a message is treated not only as a value, but also as a point inside an 8-dimensional state space.&lt;/p&gt;

&lt;p&gt;Instead of simply transforming bytes in a linear sequence, the algorithm assigns each byte a coordinate inside a virtual structure with:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;8 dimensions
128 states per dimension
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Each byte of the message is associated with a coordinate in the following format:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;[d1, d2, d3, d4, d5, d6, d7, d8]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;[12, 87, 4, 126, 31, 0, 92, 55]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;
  &lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz737tjjaqvvwoqmu20l5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz737tjjaqvvwoqmu20l5.png" alt="Tesseract-8D/128 experimental encryption concept" width="800" height="800"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;These coordinates are then transformed through multiple rounds using dimensional rotations, substitutions, permutations, diffusion, and key-derived masks. The goal is to study how a multidimensional representation can influence confusion and diffusion in an experimental cipher.&lt;/p&gt;

&lt;p&gt;This project is not intended to replace established cryptographic algorithms. It is an educational experiment designed to better understand how encryption mechanisms work and why building secure cryptography is difficult.&lt;/p&gt;

&lt;p&gt;The idea is &lt;strong&gt;not&lt;/strong&gt; to claim that “8 dimensions” automatically make the algorithm secure. In fact, this was one of the first important lessons from the analysis:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;A multidimensional representation alone does not create cryptographic security.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Security in a cipher depends on factors such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;strong non-linearity;&lt;/li&gt;
&lt;li&gt;diffusion;&lt;/li&gt;
&lt;li&gt;confusion;&lt;/li&gt;
&lt;li&gt;key schedule quality;&lt;/li&gt;
&lt;li&gt;resistance to differential and linear cryptanalysis;&lt;/li&gt;
&lt;li&gt;authentication;&lt;/li&gt;
&lt;li&gt;correct nonce usage;&lt;/li&gt;
&lt;li&gt;public analysis and testing.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In other words, the 8D model is the visual and structural inspiration, but it must contribute meaningfully to the transformation of the data.&lt;/p&gt;




&lt;h2&gt;
  
  
  Project Links
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;GitHub Repository:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="https://github.com/RazielID752/Tesseract-8D-128" rel="noopener noreferrer"&gt;https://github.com/RazielID752/Tesseract-8D-128&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Live Demo:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="https://tesseract-8-d-128.vercel.app" rel="noopener noreferrer"&gt;https://tesseract-8-d-128.vercel.app&lt;/a&gt;&lt;/p&gt;


&lt;h2&gt;
  
  
  Current Version: Tesseract-8D/128 v0.3
&lt;/h2&gt;

&lt;p&gt;The current version of the prototype is &lt;strong&gt;Tesseract-8D/128 v0.3&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The output format is:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;T8D3:nonceHex:ciphertextHex:tagHex
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Where:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;T8D3&lt;/code&gt; represents the algorithm version;&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;nonceHex&lt;/code&gt; is a unique random nonce;&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;ciphertextHex&lt;/code&gt; is the encrypted message;&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;tagHex&lt;/code&gt; is used to verify whether the payload has been modified.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  How the Idea Works
&lt;/h2&gt;

&lt;p&gt;The basic encryption flow is:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Original message
→ byte conversion
→ nonce generation
→ key derivation
→ 8D coordinates
→ transformation rounds
→ permutation
→ diffusion
→ reversible block mixing
→ authentication tag
→ final payload
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The main goal of v0.3 is to reduce the risk of &lt;strong&gt;visual complexity&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;By visual complexity, I mean something that looks sophisticated but may still be too linear or weak internally.&lt;/p&gt;

&lt;p&gt;So v0.3 focuses on making the 8D layer affect the byte transformation more directly.&lt;/p&gt;




&lt;h2&gt;
  
  
  Main Steps
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Byte Conversion
&lt;/h3&gt;

&lt;p&gt;The original message is converted into bytes.&lt;/p&gt;

&lt;p&gt;Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"Hi"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;becomes something like:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;[72, 105]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Each character is treated as a number.&lt;/p&gt;




&lt;h3&gt;
  
  
  2. Nonce
&lt;/h3&gt;

&lt;p&gt;Before encryption, the algorithm generates a &lt;code&gt;nonce&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;A nonce ensures that the same message encrypted with the same password produces different outputs.&lt;/p&gt;

&lt;p&gt;Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Message: "Hello"
Password: "123"

Encryption 1:
T8D3:abc123:...

Encryption 2:
T8D3:98f7aa:...
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Same message, same password, different encrypted outputs.&lt;/p&gt;




&lt;h3&gt;
  
  
  3. Key Derivation
&lt;/h3&gt;

&lt;p&gt;The user password is not used directly.&lt;/p&gt;

&lt;p&gt;It goes through a key derivation process:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;password + nonce → PBKDF2 + SHA-256 → internal keys
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;From that process, two internal keys are created:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;encryptionKey → used for encryption
authKey       → used for authentication/integrity checking
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This separation is important because encryption and authentication should not rely on the exact same key material.&lt;/p&gt;




&lt;h3&gt;
  
  
  4. Key Schedule
&lt;/h3&gt;

&lt;p&gt;Version v0.3 uses SHA-512 with domain separators to derive different subkeys for different purposes.&lt;/p&gt;

&lt;p&gt;Conceptually:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;roundKey = SHA-512(
  encryptionKey + nonce + domainSeparator + roundNumber
)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The current domain separators are:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;T8D-v0.3-round-key
T8D-v0.3-permutation-key
T8D-v0.3-mask-key
T8D-v0.3-tag
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This helps avoid reusing the same key material for unrelated internal operations.&lt;/p&gt;




&lt;h3&gt;
  
  
  5. 8D Coordinates
&lt;/h3&gt;

&lt;p&gt;Each byte receives an 8-dimensional coordinate based on its position, the nonce, the current round, and round-specific key material.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;[d1, d2, d3, d4, d5, d6, d7, d8]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Each dimension goes from &lt;code&gt;0&lt;/code&gt; to &lt;code&gt;127&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;When a rotation exceeds &lt;code&gt;127&lt;/code&gt;, it wraps around using modulo 128.&lt;/p&gt;

&lt;p&gt;Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;position = 126
rotation = +5

result = (126 + 5) mod 128
result = 3
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h3&gt;
  
  
  6. Dimensional Rotation
&lt;/h3&gt;

&lt;p&gt;After generating the coordinate, dimensional rotations are applied.&lt;/p&gt;

&lt;p&gt;Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Original coordinate:
[12, 87, 4, 126, 31, 0, 92, 55]

Shifts:
[5, 9, 2, 7, 1, 4, 3, 8]

Result:
[17, 96, 6, 5, 32, 4, 95, 63]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;For the fourth dimension:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;126 + 7 = 133
133 mod 128 = 5
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The value wraps around inside the 128-state space.&lt;/p&gt;




&lt;h3&gt;
  
  
  7. Non-Linear Dimension Mixing
&lt;/h3&gt;

&lt;p&gt;The idea is that one dimension should influence another.&lt;/p&gt;

&lt;p&gt;In v0.3, this is no longer only conceptual. The coordinates are mixed using a second S-Box.&lt;/p&gt;

&lt;p&gt;Conceptual example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;d1 = SBOX_B[d1 XOR d5 XOR roundKeyByte] mod 128
d2 = SBOX_B[d2 + d6 + round] mod 128
d3 = SBOX_B[d3 XOR d7 XOR maskKeyByte] mod 128
d4 = SBOX_B[d4 + d8 + roundKeyByte] mod 128
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The coordinate itself does not need to be reversed during decryption because it is recalculated from the same inputs:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;position + nonce + round + roundKey + maskKey
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h3&gt;
  
  
  8. Two S-Boxes
&lt;/h3&gt;

&lt;p&gt;Version v0.3 uses two bijective S-Boxes:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;SBOX_A → used for the main byte transformation
SBOX_B → used for masks, coordinates, dimensional mixing, and auxiliary diffusion
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;It also generates inverse S-Boxes:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;INV_SBOX_A
INV_SBOX_B
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The inverse of &lt;code&gt;SBOX_A&lt;/code&gt; is required for decryption.&lt;/p&gt;




&lt;h3&gt;
  
  
  9. Direct 8D Influence on the Byte
&lt;/h3&gt;

&lt;p&gt;One of the main improvements in v0.3 is that the 8D coordinate affects the byte value directly.&lt;/p&gt;

&lt;p&gt;Conceptually:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;coordinateXor =
  d1 XOR d3 XOR d5 XOR roundKeyByte

coordinateAdd =
  SBOX_B[(d2 + d4 + d6 + d8 + maskKeyByte) mod 256]

value =
  SBOX_A[byte XOR coordinateXor]

value =
  (value + coordinateAdd + mask) mod 256
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;During decryption, this is reversed:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;value =
  (value - coordinateAdd - mask) mod 256

byte =
  INV_SBOX_A[value] XOR coordinateXor
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This makes the 8D layer more than just a visual mapping. It becomes part of the actual byte transformation.&lt;/p&gt;




&lt;h3&gt;
  
  
  10. Permutation
&lt;/h3&gt;

&lt;p&gt;After transforming the values, the algorithm changes the positions of the bytes using a bijective permutation.&lt;/p&gt;

&lt;p&gt;Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Original positions:
[0, 1, 2, 3, 4, 5]

New order:
[4, 1, 5, 0, 3, 2]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The permutation must be bijective:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;each input position maps to one unique output position
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This is important because if two bytes were mapped to the same position, information would be lost and decryption would not work correctly.&lt;/p&gt;

&lt;p&gt;In v0.3, the permutation uses rejection sampling to reduce modulo bias.&lt;/p&gt;

&lt;p&gt;Instead of simply doing:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;j = random % (i + 1)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;it uses a function similar to:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;getUnbiasedRandomInt(maxExclusive, randomStream)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h3&gt;
  
  
  11. Diffusion
&lt;/h3&gt;

&lt;p&gt;Next, diffusion is applied in both directions.&lt;/p&gt;

&lt;p&gt;From left to right:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;block[i] = block[i] XOR accumulator
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Then from right to left:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;block[i] = block[i] XOR accumulator
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The accumulator is updated using key material and &lt;code&gt;SBOX_B&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;The goal is to create the &lt;strong&gt;avalanche effect&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;changing 1 bit of the input should change a large portion of the output
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h3&gt;
  
  
  12. Reversible Block Mixing
&lt;/h3&gt;

&lt;p&gt;Version v0.3 also adds an extra reversible block mixing layer.&lt;/p&gt;

&lt;p&gt;The important property is:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;inverseMixBlocks(mixBlocks(data)) === data
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This layer is designed to increase diffusion without breaking decryption.&lt;/p&gt;




&lt;h3&gt;
  
  
  13. Authentication Tag
&lt;/h3&gt;

&lt;p&gt;After encryption, an authentication tag is generated using HMAC-SHA-256.&lt;/p&gt;

&lt;p&gt;The tag is used to detect modifications in the payload.&lt;/p&gt;

&lt;p&gt;It authenticates:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;version + nonce + ciphertext + associated data
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If someone changes even one character of the &lt;code&gt;ciphertext&lt;/code&gt;, the tag should no longer match and decryption should fail.&lt;/p&gt;

&lt;p&gt;Example error:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Invalid tag. The message may have been modified or the key is wrong.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This is important because encryption without authentication may allow silent manipulation of encrypted data.&lt;/p&gt;




&lt;h2&gt;
  
  
  Visual Trace
&lt;/h2&gt;

&lt;p&gt;The project also includes a visual page that shows how the permutation layer moves a tracked bit position across rounds.&lt;/p&gt;

&lt;p&gt;This visualization only shows the &lt;strong&gt;trackable positional movement&lt;/strong&gt; through the permutation layer.&lt;/p&gt;

&lt;p&gt;It does &lt;strong&gt;not&lt;/strong&gt; expose:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;encryption keys;&lt;/li&gt;
&lt;li&gt;authentication keys;&lt;/li&gt;
&lt;li&gt;round keys;&lt;/li&gt;
&lt;li&gt;mask keys;&lt;/li&gt;
&lt;li&gt;full internal round states;&lt;/li&gt;
&lt;li&gt;S-Box outputs;&lt;/li&gt;
&lt;li&gt;enough information to reverse or attack a message.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is intentional.&lt;/p&gt;

&lt;p&gt;After S-Boxes, modular additions, diffusion, and block mixing, a single bit no longer keeps a clean identity. It becomes influence spread across the state.&lt;/p&gt;

&lt;p&gt;So the visualization focuses only on the part that can be honestly tracked:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;where a bit position moves during the real round permutations
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  Experimental Hash Mode
&lt;/h2&gt;

&lt;p&gt;The project also includes an experimental hash mode:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;T8D-HASH-512:digestHex
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;It produces a 512-bit digest.&lt;/p&gt;

&lt;p&gt;This is only for study and should not replace real hash functions such as SHA-256, SHA-512, SHA-3, or BLAKE3.&lt;/p&gt;




&lt;h2&gt;
  
  
  Initial Critical Analysis
&lt;/h2&gt;

&lt;p&gt;After building the first version, I asked for a critical analysis of the idea. The main point raised was:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;8 dimensions do not automatically increase security.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;And that makes sense.&lt;/p&gt;

&lt;p&gt;If the internal algorithm uses only:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;XOR
modular addition
rotation
permutation
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;it may look complex while still being too linear internally.&lt;/p&gt;

&lt;p&gt;This is the risk of what I call &lt;strong&gt;visual complexity&lt;/strong&gt;: something may look sophisticated but still fail to provide real cryptographic strength.&lt;/p&gt;

&lt;p&gt;Because of that, v0.3 focuses on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;making the 8D layer directly influence the byte value;&lt;/li&gt;
&lt;li&gt;using two S-Boxes;&lt;/li&gt;
&lt;li&gt;adding non-linearity to the coordinates;&lt;/li&gt;
&lt;li&gt;improving permutation generation;&lt;/li&gt;
&lt;li&gt;reducing statistical bias;&lt;/li&gt;
&lt;li&gt;creating avalanche tests;&lt;/li&gt;
&lt;li&gt;creating entropy tests;&lt;/li&gt;
&lt;li&gt;testing repeated messages;&lt;/li&gt;
&lt;li&gt;analyzing patterns in the ciphertext.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  What I Want to Test
&lt;/h2&gt;

&lt;p&gt;Some tests implemented or planned:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;1. Reversibility
Encrypting and decrypting must return exactly the original text.

2. Message avalanche
Changing 1 bit of the message should change a large portion of the ciphertext.

3. Key avalanche
Changing 1 character of the password should generate a completely different output.

4. Nonce behavior
Same message + same password + different nonce should produce different ciphertext.

5. Repeated text
Messages like "AAAAAAAAAAAAAA" should not generate obvious patterns.

6. Modified payload
Any change in the ciphertext should invalidate the authentication tag.

7. Entropy
The output should have a distribution close to random.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  Technologies Used
&lt;/h2&gt;

&lt;p&gt;The implementation is being built with:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Vite
TypeScript
Web Crypto API
PBKDF2
SHA-512
HMAC-SHA-256
Lucide icons
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The goal is to keep the project simple, visual, and easy to test in the browser.&lt;/p&gt;




&lt;h2&gt;
  
  
  Important: This Is Not for Production
&lt;/h2&gt;

&lt;p&gt;This project is only an educational experiment.&lt;/p&gt;

&lt;p&gt;It &lt;strong&gt;must not be used to protect real data&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Cryptography is extremely sensitive. Secure algorithms require years of analysis, public review, attacks, tests, and validation by specialists.&lt;/p&gt;

&lt;p&gt;The goal here is to learn and experiment with concepts such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;symmetric encryption;&lt;/li&gt;
&lt;li&gt;nonce;&lt;/li&gt;
&lt;li&gt;key derivation;&lt;/li&gt;
&lt;li&gt;S-Box;&lt;/li&gt;
&lt;li&gt;confusion;&lt;/li&gt;
&lt;li&gt;diffusion;&lt;/li&gt;
&lt;li&gt;permutation;&lt;/li&gt;
&lt;li&gt;avalanche effect;&lt;/li&gt;
&lt;li&gt;message authentication;&lt;/li&gt;
&lt;li&gt;basic cryptanalysis.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Tesseract-8D/128&lt;/strong&gt; started as a visual idea:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;What if a message could be transformed as if it were traveling through an 8-dimensional space?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;However, during the study, it became clear that the visual model alone is not enough.&lt;/p&gt;

&lt;p&gt;For an algorithm like this to become interesting from a cryptographic perspective, it needs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;real non-linearity;&lt;/li&gt;
&lt;li&gt;strong diffusion;&lt;/li&gt;
&lt;li&gt;a solid key schedule;&lt;/li&gt;
&lt;li&gt;authentication;&lt;/li&gt;
&lt;li&gt;statistical testing;&lt;/li&gt;
&lt;li&gt;resistance to obvious patterns;&lt;/li&gt;
&lt;li&gt;critical review.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is still far from being a secure cipher, but it has already become a great exercise for understanding how modern encryption systems are designed and why creating your own cryptography is so difficult.&lt;/p&gt;

&lt;p&gt;If you have suggestions, criticism, or attack ideas, feel free to share them.&lt;/p&gt;

</description>
      <category>typescript</category>
      <category>cryptography</category>
      <category>encryption</category>
      <category>security</category>
    </item>
  </channel>
</rss>
