top of page

Runtime, Cyclical Cypher - File Encryption

  • Sydney Matinga
  • Dec 12, 2025
  • 2 min read

Updated: 4 days ago


Terms of Reference

Refer to the post, Terms of Use Agreement Xerqon Technologies, WIX Blog 2025, for early, legal due diligence.


Runtime, Cyclical Cypher

Encryption on the fly is best facilitated by encryption keys which directly utilise the system clock. A time-dependant key is indicated below: As long as the initial timestamp for each key is unknown (from the storage) the key would be extremely difficult to break. Telnet password acquisition is the only way to break this encryption, as there is infinite variability to h, the public key, below. x should unpredictable to add strength to that assertion.


Encryption Cypher - File Dependent Encryption


(1)   Description of cypher:


       First, to discover the clock in database, without referencing Visual Basic


                    x        = Pi rad * ( 1 Hz ) * t / Pi rad

= Pi rad * ( 1 Hz ) * runtime / Pi rad

                    a        = constant

                    h        = file variable


     Encryption Cypher:

     A [E]                   =        ( a  ^ 2 - ( x    -   h) ^ 2 ) ) ^ 1/2 ,

                                            f (x)


   Decryption Cypher

    A [D]                   =       - ((( A [E] ^ 2 - a ^ 2 ) ^ 1/2 ) - x ) ,


                                            h

      

The cypher, private key is the file value to substitute h. This is to be stored in a secure server and never seen by human eyes, unless in encrypted format.


The cypher, public key is the variable, x, without substituting the file value for the same.


© Xerqon ABN 97661410108 2025

 
 
 

Recent Posts

See All
Metal Carbide - Hardened Alloys and Semiconductors

Terms of Reference Refer to the post, Terms of Use Agreement Xerqon Technologies, WIX Blog 2025 , for early, legal due diligence. Metal Carbide (Carbide) The Agreement for the Intellectual Property ri

 
 
 

Comments


Technology Transfer Protocol

The first stage of Centreweave's distribution model will be an auction for 5 distributor/user organisations to compete for that level of exclusivity. The field of bidders will be up to 100 commercially interested organisations worldwide. For engineering or IT integration enquiries, email managingdirector@centreweave.com.

© Xerqon ABN 97661410108 2025

bottom of page