Geometric Cipher Explorer

Discover how mathematics and geometry can create secure encryption keys through polygon centroid calculations.

Cipher Configuration

5

More sides create more complex ciphers but require more computation

Changes the shape of the polygon for different keys

Selects which centroid to use for the final key

Generated Key

Your cipher key will appear here

Cipher Visualization

Original Polygon
Level 1 Centroids
Level 2 Centroids

Visualization will appear here

Calculation Progress 0%
0
Level 1 Centroids
0
Level 2 Centroids
0
Key Length

What is Ciphering?

Turning Messages into Secret Codes

A cipher is a method of transforming information to conceal its meaning and keep it secret. It's like a secret code that only people with the right key can understand!

How Ciphers Work:

  • You start with a message (called "plaintext")
  • You apply a cipher algorithm with a key
  • You get a secret message (called "ciphertext")
  • Only someone with the right key can decipher it

Simple Example:

Original: HELLO

Key: Shift each letter by 3 positions

Encrypted: KHOOR

How Geometric Ciphers Work

1

Creating the Base Polygon

We start with a polygon with 5 sides. The seed value 1083 determines the exact shape of this polygon. Each vertex is placed at a pseudo-random position based on this seed.

2

First Level Centroids

We form all possible triangles from the polygon's vertices. For each triangle, we calculate its centroid (the point where the three medians intersect). This gives us 10 Level 1 centroids.

3

Second Level Centroids

Now we form triangles from the Level 1 centroids and calculate their centroids. This creates 120 Level 2 centroids. We select the 1st centroid from this set.

4

Creating the Numeric Key

The coordinates of the selected centroid are combined into a large number by removing the decimal point. This creates a unique numeric key that can be used for encryption.

How Ciphers Are Used

Real-World Applications

Secure Communication

Ciphers protect messages sent over the internet, like emails and instant messages.

Online Payments

Encryption keeps your credit card information safe when shopping online.

Mobile Communications

Your phone calls and texts are encrypted to prevent eavesdropping.

Why Geometric Ciphers?

Avalanche Effect

Tiny changes in the input values (n, m, or k) produce completely different keys, similar to professional cryptographic algorithms.

Mathematical Foundation

Geometric ciphers demonstrate how mathematical concepts can be applied to create secure encryption methods.

Security Properties

Key Space Size

The number of possible keys depends on the polygon sides (n). For n=5, there are 120 possible Level 2 centroids to choose from.

Computational Security

The number of calculations grows rapidly with more polygon sides, making brute-force attacks difficult for larger values of n.

Educational Value

This cipher demonstrates how mathematical concepts can be applied to cryptography, helping students understand fundamental security principles.

Pattern Recognition

Geometric ciphers help develop pattern recognition skills, which are fundamental to understanding more complex encryption methods.