US 12,463,796 B1
Systems and methods for data encryption, decryption, and authentication
Thurman Richard White, Nashville, TN (US); Martin Thomas Poe, III, Nashville, TN (US); and Martin Thomas Poe, IV, Nashville, TN (US)
Assigned to ATOFIA LLC, Nashville, TN (US)
Filed by ATOFIA LLC, Nashville, TN (US)
Filed on Mar. 14, 2025, as Appl. No. 19/080,179.
Application 19/080,179 is a continuation of application No. 19/034,297, filed on Jan. 22, 2025, granted, now 12,289,394.
Application 19/034,297 is a continuation of application No. 18/655,171, filed on May 3, 2024, granted, now 12,212,653.
Application 18/655,171 is a continuation of application No. 18/466,822, filed on Sep. 14, 2023, granted, now 11,895,222.
Application 18/466,822 is a continuation of application No. 18/200,211, filed on May 22, 2023, granted, now 12,034,832.
Int. Cl. H04L 9/06 (2006.01)
CPC H04L 9/0631 (2013.01) 9 Claims
OG exemplary drawing
 
1. A computer-implemented method for retrieving, preparing, embedding, and transmitting value sets for decrypting a ciphertext, comprising:
retrieving one or more files from data storage, each file including an encryption value set including
Character Matrix P+1 values for use of Transformation Engine P+1 on a character matrix for characters of the ciphertext,
Character Matrix P−1 values for use of Transformation Engine P−1 on a character matrix for characters of the ciphertext,
Nibble Matrix P+1 values for use of the Transformation Engine P+1 on a nibble matrix for characters split from a character matrix,
Nibble Matrix P−1 values for use of the Transformation Engine P−1 on a nibble matrix for characters split from a character matrix,
Bit Matrix P+1 values for use of the Transformation Engine P+1 on a bit matrix for nibbles of characters split from a nibble matrix, or
Bit Matrix P−1 values for use of the Transformation Engine P−1 on a bit matrix for nibbles of characters split from a nibble matrix;
wherein the transformation engines P+1 and P−1 operate on an input matrix until different respective execution conditions are satisfied;
generating, based on the one or more files, instructions for decrypting the ciphertext, wherein the instructions for decrypting the ciphertext are included as a section of the ciphertext;
generating a copy of each encryption value set;
designating each copy of each encryption value set as a decryption value set in a plurality of decryption value sets;
removing an encryption decider from each of the decryption value sets to arrange the decryption value sets into a sequence;
embedding the decryption value sets into the instructions for decrypting the ciphertext; and
transmitting, over a network, the ciphertext to a recipient for decrypting the ciphertext as a one-way function using the decryption value sets embedded in the instructions for decrypting the ciphertext.