August 6, 2025
algorithm | cipher | cryptography | encryption | extendable output function | one time pad | security
Cryptography
Stealth: Uncrackable Encryption

Abstract
Stealth is a cryptographic system utilizing the mathematically unbreakable One-Time Pad, or OTP.
It combines a new OTP-XOF hashing function, a bit-reordering exchange cipher, and ephemeral keys generated from mouse and time coordinates and a master secret.
This system makes decryption impossible without the right key, achieving Perfect Secrecy and Forward Secrecy.
Body
1. Introduction
Stealth offers a practical implementation of uncrackable encryption by utilizing:
- Encryption: To scramble with a key.
- Decryption: To undo encryption with the same key used for encrypting.
- Ciphers: Each cipher is a series of steps for doing encryption and/or decryption.
- Bits: The most basic form of computer information, short for Binary digits; only 0 or 1.
- Bit-Reordering Exchange Cipher: Encrypts the message by rearranging its bits based of the key, making decryption without the key mathematically impossible.
- Perfect Secrecy: Without knowing the key used to encrypt, its mathematically impossible to gain any information from the encrypted message.
- Forward Secrecy: Without knowing the key used to encrypt, even if you know the decryption of one message, its mathematically impossible to gain any information from other encrypted messages.
- An OTP: OTP means One-Time Pad, and OTPs are unbreakable ciphers, because they have Perfect Secrecy.
- Characters: The smallest units of text; numbers, letters and symbols.
- Hashes: A hash is the output of a mathematical function, called a hash function, that takes an input, or “message”, and produces a string of characters. The output, known as a hash value or digest, is unique to the input in the sense that even a small change to the input will produce a vastly different hash value.
- An XOF: An XOF, or Extendable-Output Function, is a hashing function that makes hashes of any chosen length.
- OTP-XOF Hashing: OTP-XOF hashing combines OTP and XOF features into one hashing function, of which the key size equals the chosen output length.
- Ephemeral Keys: Unique, temporary keys made using the OTP-XOF, from mouse and time coordinates and a user-provided master secret, that are for and only exist once for each encryption and/or decryption.
Bibliography
- Aleksander Essex. “Encryption Basics and Classical Ciphers,” September 20, 2020. https://www.youtube.com/watch?v=4-wlwrX-u7w.
- ScienceWorld. “One-Time Pad Cipher (Perfect Security),” May 4, 2021. https://www.youtube.com/watch?v=F5Yrk6LHM2w.
- Spanning Tree. “How to Send a Secret Message,” June 11, 2020. https://www.youtube.com/watch?v=I6Unxb-PFhs.