[4] hash funktion

brian carroll electromagnetize@gmail.com
Sat Sep 14 15:09:37 PDT 2013


// attempt at a basic comparative example here...

--- code play ---

first to reference the previous transparent ziplock with letters (ACID) to
provide conceptual framework for what follows... and how the *interpretive*
aspect of the code, its encoding/decoding and encrypting/decrypting, may
likewise relate in some way as a transformative, calculative process (if
not phase-change). not going theory, just abstraction into a realm of
N-dimensions and probability versus linear equation exegesis...

here are some online resources then for examining the letters [A,C,I,D], as
recombinational variables:

#Internet Anagram Server mentioned two solutions:
http://wordsmith.org/anagram/index.html

    CAD I, and ACID

#Scrabble Word Finder lists 8 word solutions:
http://www.scrabblefinder.com/solver/

   4 letters: acid, cadi, caid
   3 letters: aid, cad
   2 letters: ad, ai, id

And other scrabble word searches find additional, including 'da' and 'i'

So there are these permutative interactions that can occur within and
between signs (letters and their arrangement, though also symbols) and this
is mapped out to some degree with anagrams, palindromes, ambigrams, rebus',
kangaroo words (word within a word), and so on.

#Palindromes, anagrams, and 9 other names for alphabetical antics
http://theweek.com/article/index/244111/palindromes-anagrams-and-9-other-names-for-alphabetical-antics

In terms of language, this is a zone of paradox where multiple meanings
could exist in a 'string' that could have more than one interpretation, say
the word 'top' and 'top', one indicating 'the upper part of something' and
the other 'a child's toy' via dictionary reference. yet without context how
can you determine which viewpoint is correct: is there actually a 1:1
meaning or is it one to many? Thus, in some sense, weighted given the
environment it occupies for observation. Thus paradox, though also
superposition, and an aspect of the unknown or mystery within the ordinary
and everyday that in a binary worldview would seek to determine a 1:1
answer and discard the other 'variables', and linearly "progress" in such
computations down a particular _unique path that then is equated with _the
correct path, analytically, even though potentially arbitrary or flawed.

Any such search engines for 'words' can be broken via substitutions, as
mentioned before, and doing so would limit or bound the interpretation to a
smaller set. Thus using a number one instead of capital 'i' causes the
library reference to ignore the variable, discard it from consideration,
and only analyze ACD; returning only 3 sets: cad, ad, da. So it moves from
8 words to 3 words due to illiteracy or incapacity to translate or
substitute, as mentioned previously.

Yet once again consider the ACID letters, in particular the letter 'I'
again as it may be hypothetically or conceptually connected to the letter D
and result in new letter potentials: P, d, q, b --- likewise the letter 'C'
could be turned sideways into the letters U and n.  Note the transgression
of upper and lowercase alphabets, opening up a much wider range of letter
combinations via allowing multiple scales to co-exist in the evaluative
framework. Further, the letters C and I can be combined into a second
letter D.

Thus A,C,I,D, can become [A,C,I,D,D,U,n,p,d,q,b] as a potential string, if
'suspending judgement' and allowing time to configure and reconfigured *in
a probability space* these co-existing parallel potentials. inputting the
string (aciddunpdqb) at the Scrabble Word Finder leads to 110 words, with
six letters the highest word count of eleven total.

A question being, is the 'string' ACID really only ACID, as if 1:1 in terms
of code and its meaning, and if 'decrypted' perhaps CAD I would be a
result; and likewise, what if this could range to 110 words, without
considering two or more letter acronyms and abbreviations, and then, each
of these unpacked "variables" could potentially be related to one another
as a structural framework from which to further reveal or construct code,
such as via the subset words: candid, baud, pin. Perhaps keys or a bermuda
triangle zone that submerges or reveals purposefully scuttled content. This
location related to another inside the same hash function: cab, pain, quid;
or yet another: cabin, cupid, id.

Essentially sets related if not collided and run against other sets, one
against many, symmetries or asymmetrical dynamics, spins, planes, fields,
layers, levels, zones of meaning shared and unshared. Perhaps someone could
even have the key and yet get lost in the ever expanding forest of never
ending choices, thus: the labyrinth is constructed by each interaction and
decision and without the correct context, variables in their superposition
could remain hidden in their correct interpretation (A=A)

how could you know without an observer of shared identity and same model of
empirical truth to reference, given N-possibilities for each choice and
evaluation, potentially, as this is bounded by whatever the keyspace may
be: only capital letters, alphanumeric plus symbols, whatever. and
likewise, in terms of computation and equipment, could this same HASH
function be recreated _without identical equipment, due to the floating
point aspect (if it were to still exist) in computating irrational numbers,
given a necessary boundary to stop and round up or down at that limit, thus
forcing alphabets or equations into one hash scenario or another-- and
could enough of this be controlled to even allow two machines to function
identically or may there inherently be noise (chaos) between them, and so
it is an issue of approximation, creating the same structures via unpacking
a superposition ~bit-string and yet having variability still within these
parallel models

It just reminds so much of enigma and patch cords that perhaps the the RNG
with patch-cord like custom circuit wiring could tweak machines to a shared
match or 'entangled parallelism' that technology may be limited in allowing
due to limits to standardization at the level of unique processors with
slightly different characteristics, processor temperatures or working
transistors that could somehow effect computation, speed, rounding, at what
boundary the evaluation is bounded. perhaps different bounding could
provide different codes or access: abc^10 opening up one hash and abc^2
opening up another entirely different subset universe in terms of what
appears in its relational structuring. different tech, different hashspace
(?) given how much infinity can be modeled and to what extent -- And thus
what might keys be. what if the starting variable was used multiple times,
such as opened at one level and then reopened at another, and these
compared, or some mathematical computation occurring to parse each against
the other, and using that derivation for the keyspace. The idea of custom
wiring in addition just unpacking then potentially allowing one version of
crypto-signage to be used many times and in many different ways, as if
signpost even or relay or storage device, as if such crypto could be
infrastructure, if not alive like a sensor network in terms of feeding and
routing information through such matrices

it is curious if perhaps this is opposite the idea of the hash, in that it
is an inversion or reverse hash function or something such, due to its
exponentiality of parallelism and superposition versus linearity that
appears standard to the naive outside observer of this.

Just to provide a different example entirely, for consideration- imagine a
two variable string, [v][w], in this superposition context. Despite the
known transmutations such as the letters being flipped and turned, such
that two letters v = w, or when flipped could equate to acronym 'mn', it is
more than a single letter as the variable and instead, say, the signs S and
O that are overlapped for a single variable [v], such that their layering
appears as if the number 8 or letter B. and likewise, a second variable as
letters F and L traced atop one another, resulting in the combined letter
E, much like a Jasper Johns painting or 7 segment or 16 segment display. In
this approach, [B][E] then could, as a 'string' carry these other letter
potentials within it or could no longer be decipherable as a standard
alphabet letter and instead as a structural pattern, and then computation
could occur via breaking down these patterns in that abstraction, mapped to
potential letters and numbers and their recombination. For instance the
letter B is equivalent to number 8 and via 7-segment displays, encompasses
all numbers 0-9 in its geometry. Thus what if [3][E] were suddenly
evaluated in a context of letters [S,O,B,E,L,F] and its 47 words unpacked
from this starting point; say 'fobs' <=> 'lobes', as a subset universe
within which, via another key, may match to a circuit elsewhere or provide
meaning and thus 'shared framework for interpretation' whether intentional
or unintentional. likewise, lesbo and sol, fe, Io, os & so -- leading into
potential transcendent oblivion... or other dimensionality beyond what can
be determined, predicted or controlled even- the RNG as REG, tapping cosmic
circuitry as if interdimensional tendrils of noosphere

--- another aspect ---

in terms of superposition variables, the length of [x] in the string
[x,y,z] could be _anything. the bit as container could hold a bounded
infinity, it could hold a mathematical function, it could hold five numbers
or a hundred million trillion, or could nest or subset other variables in
chained relations, such that x = xz. and thus a larger string could
generate more complex entry code or certain structures, yet it may be
unrelated to solving the interior of the hashing package because its inside
is larger than its outside

symbols especially relevant here, HIOX, fractal codes, ciphers within
signage so that it is beyond ordinary language to begin with, such an
approach could be two variable and encompass a vast universe of relations,
say as a partial HIOX symbol (16 segment) or fractal-based sign of letters
embedded one inside the next, say a Y being letters I and V combined, yet
far beyond this and into a keyword written inside a starting letter, at
scale, and moving downward or across, and having that be a variable that
unpacks certain letters and characters and not others, thus potentially
relating this outside with inside via the starting string, thus providing
context via its superposition options that may be more complex
"structurally", all of this requiring a standard approach that is shared,
grounded in truth and logical reasoning, to allow 'the language as code' to
be useful for shared communication, carrying ideas, or being the idea-
seemingly about providing context, creating the conditions allowing for
such interpretation to exist

also, it should be noted that this could easily involve numbers and so
alphanumerics could exist in a state of superposition between their
mathematical and linguistic meaning, again 'variable' in terms of
interpretive framework; for instance, a number 4 may be missing its
hypotenuse or upper-left bracket -- given character style or typographic
standard -- and thus it may look instead like a sideways letter T, in some
sense. And thus the glyph representing sideways-T could *potentially*
occupy both the realm of the letter T and-or the number 4 in terms of
superposition, given that it is somewhat corrupted or incomplete or has
extra information (such as Q and O similarly).

thus a starting bit-string could have strange symbols that could map into
letters and numbers via transformation (its de|con-struction via
constructions and destructions) of subset relations and dynamics, unpacking
particular characters and relations, creating a particular type of noise
field for other content, perhaps framing it for interpretation. And thus
language itself, tending towards noise if not illegible, may look like
actual hash code to start the string, then unpack its contained information
based on these variables that may normalize within certain parameters and
not others, providing both signal and noise- and perhaps having multiple
keys or no keys and to be accessed or referenced via temporary tunings or
harmonizations, as if emergent data, or a particular correlated state of
shared mind, et cetera

--- example ---

so i could provide a ~bit-string (do not know the correct word so that is a
conceptual placeholder until someone those knows what this is define the
concepts accurately) such as the following and it could be assumed to
operate and function within these stated dynamics...

   [nv+x!]

in other words: [n][v][+][x][!]

And here is what i think is peculiarly interesting- is that i could shared
with you 'the key' that created this string, for a subsequent parallel hash
function, via superposition, yet it may or may not be relevant to what is
unpacked on the inside unless it were activated, and thus it is like an
on/off switch that may not be in the interpretative context and so can be
routed around if compromised, or used as ruse and trap to set up
alternative interior corridors and pathways to checkmate mimics via false
perspectives.

so, running through the example... potentials: n, c, u, v, n, >, <, +, t,
j, r, x, +, v, y, ., l, i, !

Note duplications are added for combination potentials, especially useful
for acronyms or symbolic 'compressed' meaning, mirroring of palindromes,
etc. likewise, punctuation is allowed for its dual-use language capacity,
the exclamation point rotated into the lowercase letter i, and period
useful perhaps in other ways as well. As with plus sign and the lowercase
t.  the issue of archetypal transference alongside transformative mutation,
as if organization, allowing for entropic reversal or coherence gains even
via losses, such is the "calculus" of the signage, as if moving from
concept 1 (speed) to concept 2 (acceleration) yet within a different
conceptual realm, wide ranging if not arbitrary

and thus the issue of *potential*, as with potential energy- *potential
meaning* and potential interpretation, framework, structure, that may exist
momentarily or collapse given shared or unshared identity, referent,
whatnot.

so it would be possible to say 'cat' is what generated the original string,
the upside-down caret (^) removed of the crossbar a hint or clue to the
uppercase A at another scale (uppercase versus lower), and the plus sign
functioning as a category-crossing letter t. and that could be the basis
for generating the hash funktion, via this string-- and it may or may not
be relevant, it may or may not be used beyond this threshold, it may or may
not be the framework once the interior is unpacked, and this depends on the
keyspace and how many variables will be referenced on the inside, though
could also be on the outside as well, and only [n,v,+] could be used in
their permutations and nested recombinations- meaning different hashes
could be referenced and made active depending either on generating key, as
a partial string (thus secret) or it could be entirely open and yet of an
unshared POV, bounded and limited in observation via threshold of
eavesdropper, and thus their biasing could force only some variables and
not others, which it is proposed may make it nearly impossible to decipher
externally without knowing what is being communicated in a given framework
or context that is only partially observed and evaluated. such that it may
not add up the same, just as unpacking the string with different hardware
capabilities may generate different random interrelations as noise though
also structure, if somehow calculations are not tuned A:A and instead it is
closer to A1=A2, though compensated for. it is as if relativism itself is
the encryption envelope, its warping skew distortion where the data can
hide within and between and the revealed structures *whatever they may be*
could be one-time pad connections or stable grids or force fields spanning
multiple such hash universes that interconnect or feed data one into
another again perhaps like wormholes

further, phonetics could be used for substitutions such that the original
lowercase letter 'c' and its subset [v, ^, c, n] could be replaced by 'k'
such that kat=cat in terms of pronunciation yet has no trace of a c from
which to decipher via a dictionary search, unless phonetic. in this way the
original string [nv+x!] could instead be: [kv+x!] and generate an entirely
different inferiority to reference, which may or may not be keyed to 'cat'
in any given instance, unless it were to be, yet may not reveal anything
even if the key is known, given perspective and variable timing and
interpretations. it could be throwaway or only active on occasion or a
divining method such as organizing cards out of a Tarot deck for reading, a
process that establishes interpretation though in a magical context, and
thus perhaps more ritual or procedural yet still an important vital step.
i.e. if everything is in tune, because the arbitrary could cut either way
if not 'literate' and capable of handling this kind of code and
interpretation as it were- it could drive you crazy

of all the myriad possibilities, this is a infinitesimal example and it
would be in the collection of all various techniques and approaches and
evaluation and surveying their coherence and decoherence dynamics and
related functionality that perhaps a new approach to coding could be
developed in this alphanumeric and symbolic parallelism where sign=sign is
essentially outside of the language as it operates in consciousness, unless
brought into a realm of shared truth (1) and shared perspectives for
exchange. thus creating or *revealing* that realm, essentially navigable
infinity and issues of markers, lighthouses, obelisks, waypoints,
ecosystems and ecologies, mazes, traps, that mapping data or mining,
storing, conveying, relaying information within preexisting contexts,
frameworks, could be utilized- made infrastructural, another paradigm
entirely that aligns with consciousness, not the deadzone of the silicon
wasteland as if final destiny of life with the singularity, leading to
death and nothingness as ideal future.

current and currency. a realm for those literate and of shared awareness.
keeping the lies and the liars and their falsehood out of the equations,
trapping them in their own false perspectives and thus bounding the
interaction while the false perspective is dismantled, freezing everything
binary in its place while the word keeping spinning. this, perhaps a
reverse-vertigo effect of the nonsensibility of the perceived world, though
from another point of view. the oppressive ideology extinguished, no longer
capable of sustaining the lies and controlling events from an external
position, losing power of 'shared awareness' by dissimilar or dismantled
structures-- sitting ducks. quack,quack.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20130914/3cdb2e80/attachment.html>


More information about the cypherpunks mailing list