Encryption as Poetry — decrypt into a new poem
Write or paste your plaintext poem below. Encrypt -> verse. Decrypt -> novel poem (deterministic, mythic lexicon).
(ciphertext or poem will appear here)
Keycard (toggle)
No key yet.
Keep this safe. Anyone with the key + IV (and salt if used) can reproduce the same poem from this ciphertext.
Info: Transmutation mode (and exact recovery)
Transmute The Decrypt button uses a deterministic generator seeded by key + IV + ciphertext to compose a new poem from internal lexicons. Same inputs -> same poem. Different inputs -> different poem.
Exact recovery (hidden) For testing, you can still recover the exact plaintext:
AES-GCM
PBKDF2
HMAC/SHA-256 seeding
Deterministic PRNG
How encrypted data becomes a poem
Deterministic steps:
- Encrypt. AES-GCM produces ciphertext using your key + IV.
- Seed. Compute HMAC-SHA256(rawKey, IV || ciphertext).
- PRNG. SHA-256 stream expands the seed into pseudo-random bytes.
- Form. Key fingerprint sets line length and stanza size.
- Lexicon. PRNG chooses nouns/verbs/adjs/advs from Nullion, Moloch, Mammon, Nehara, Yodabund, etc.
- Determinism. Same inputs => same poem. Different inputs => new poem.
- Privacy. Original plaintext is not consulted during transmutation; the poem is generated from cryptographic state.
seed = HMAC(key, IV||ciphertext) prng = SHA256_stream(seed) form = prosody_from(key) poem = generate(prng, lexicon)
No comments:
Post a Comment