What Cipher Guarantees
Cipher Protocol: Deterministic Encryption
Cipher delivers a deterministic encryption protocol based on a fully local and decentralized architecture. The guarantees it provides are strict, uncompromising, and verifiable by design.
1. Full Local Execution
All encryption, decryption, key derivation, and state logic operate entirely within the user’s environment. No request is sent to any server. No part of the cryptographic process requires external dependencies.
2. Key and Channel Integrity
Cipher does not generate or store any private keys, public keys, or structured channels. These are provided and managed solely by the user. What Cipher guarantees is that:
Valid key pairs will deterministically produce the same results across devices.
Structured channels matching the format rules will be parsed and applied identically, every time.
3. AES Isolation
The AES key used for final encryption is deterministically derived using a zero-knowledge construction: a hashed combination of the user’s shared secret and the structured channel. This key is:
Never stored
Never transmitted
Never shared
It is re-derived locally for every operation.
4. Stateless, Reproducible Outputs
Given the exact same inputs — private key, public key, recipient key, structured channel, and plaintext — Cipher guarantees:
Identical ciphertext output
Identical decryption result
No variation or entropy loss across environments
There is no randomness in execution. Determinism is core to the protocol.
5. Irreversibility by Design
Cipher's polymorphic substitution layers (up to 20) introduce probabilistic irreversibility. Without the exact structured channel and matching key pairs, brute-forcing a message becomes computationally intractable — even if part of the output were recovered.
Cipher guarantees that:
No partial access yields any meaningful insight.
Wrong inputs produce noise indistinguishable from incorrect guesses.
Failure is silent — attackers cannot tell if they are close or infinitely far.
Last updated