The Aetherokrypt Research Series, pioneered by Muhammed Shafin P, delves into the realm of ultra-secure, offline encryption methodologies, aiming to circumvent conventional cryptographic reliance on network-based key exchanges and external time synchronization. This innovative series introduces two primary concepts: Time-Locked Symmetric Encryption (TLSE) and Unicode-Obscured Pre-Shared Key End-to-End Encryption (UOPS-E2EE).
Time-Locked Symmetric Encryption (TLSE) TLSE proposes a unique symmetric encryption system that generates an ephemeral key every minute. This key derivation is based on the current hour and minute (HHMM) combined with a pre-shared secret phrase. A critical security feature of TLSE is its "proprietary encoding phase" within the key generation process, which is known exclusively to the binary's creator. This advanced layer aims to prevent unauthorized key generation, even if the basic SHA256(phrase + HHMM) formula is discovered, ensuring only authentic TLSE binaries can produce compatible keys. The system operates independently of system network time protocol (NTP) or external time sources, relying on an embedded internal clock. TLSE's design prioritizes the elimination of traditional key distribution challenges, making it suitable for secure local or air-gapped environments and Capture The Flag (CTF) challenges. It incorporates robust binary protection mechanisms, including complete code confusion, internal symbol renaming, and anti-analysis measures, to resist reverse engineering and safeguard its proprietary encoding algorithms. The GitHub repository for TLSE is available at https://github.com/hejhdiss/TLSE.
Unicode-Obscured Pre-Shared Key End-to-End Encryption (UOPS-E2EE) UOPS-E2EE presents a framework designed for extreme security constraints where encryption keys are never transmitted during runtime. Instead, decryption keys are reconstructed from fragments meticulously hidden through steganography within innocuous public media or directories. This is complemented by sophisticated Unicode manipulation, employing zero-width characters and homoglyphs, to camouflage server endpoints and obscure true communication paths from typical enumeration tools. UOPS-E2EE employs robust symmetric encryption for all communication, with data encrypted client-side before transmission and decrypted server-side using its internal copy of the pre-shared key, entirely eliminating key transmission over the wire. The system is intended for binary-only distribution, with the frontend client's internals further obfuscated to resist static and dynamic analysis. It is designed for operation in highly controlled, localized environments, typically bound to localhost. Future enhancements for UOPS-E2EE are planned to include advanced encoding for embedded data, polymorphic steganography, dynamic key fragment placement, and the integration of non-decrypting intermediate servers for traffic transformation and obfuscation. The GitHub repository for UOPS-E2EE can be found at https://github.com/hejhdiss/UOPS-E2EE.
Both TLSE and UOPS-E2EE are currently in the conceptual and prototype stages, serving as frameworks for exploring advanced techniques in secure communication, combining encryption, steganography, and software obfuscation. The Aetherokrypt Research Series, encompassing these concepts, is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0). This license permits sharing, adapting, remixing, and building upon the material, even commercially, provided proper credit is given and modifications are licensed under the same terms. Muhammed Shafin P encourages derivative implementations of these ideas to be published under more permissive open-source licenses, such as MIT or Apache 2.0, to foster broader adoption and commercial use, while still ensuring attribution and respecting the proprietary nature of the encoding algorithms. The overarching goal of the project is to redefine secure encryption in contexts demanding privacy, portability, and operational security without reliance on traditional network-based cryptographic dependencies.
Top comments (0)