Adaptive Cypher Solution
Scalable cryptographic cypher with advanced resistant properties
Size Matters
The algorithm inherently becomes more resilient as message size grows.
Pattern Key Layers
The concept is that only users who have the key to a message will be able to read it.
Save data transfer
Based on its mathematical construct, the cipher is presumed to be resistant to known quantum attacks such as Grover’s algorithms.
Introduction
A21 AdaptCrypt is a scalable cryptographic cypher with experimental quantum-resistant properties.
Designed to withstand the threats of quantum computing encryption, which is a weakness of classical methods. Increasing complexity, resistance to classical attacks, and potential quantum resistance should provide a new level of protection for data package transmission.
Encrypted text
85048980155445535454875440
38951554891762083538253672
13522849199787682552462359
14628312733923408235033808
74464483051821542361500177
58854315365992194758841837
Key for decryption
Original Text
Faust is gone to the void
Contains the most common letters of the English alphabet.
It has protection against decryption based on the most frequently occurring letters (Frequency analysis).
Use only 1 graphic layer key
Small size of the message (that means smaller protection)
It doesn’t use compression.
Opportunities
The Cypher has protection against quantum attack and has exponential encryption complexity (by length).
- The version of the cypher presented in this presentation is A21 (only numbers used for encryption).
- The version A22 works with a larger number of more complex variations of graphic keys.
- The version of A23 in development and works with multiple symbols and languages.

Open the example of encrypted text
You can see an example of the ciphertext of version A21. To maintain interest and cooperation with the community in further development, a reward for deciphering it is offered (the reward grows every day).
How it Works
The Encryption Process

Text Encryption
Initial plaintext is converted into a structured format, ready for multi-layered encoding. More text means is better for protection.

Text Protection

Size Analysis
The message is analyzed for length and complexity. This determines how the algorithm dynamically scales encryption difficulty.

Generation of G.Key
A unique Graphical key (G.Key) is created using entropy from the input and system state. A pattern for data protection.

Encrypt the Message
The message is encrypted through a compound algorithm using the G.Key, with complexity increasing proportionally to data size.

Additional Layers
Optional post-encryption layers are added, including data fragmentation and secondary encoding to enhance resilience.
Roadmap
What is possible in near future
The goal is to use the cipher with quantum technologies. The cipher can theoretically be implemented in a bit-level data writing format, where each bit of the encrypted message is stored or written individually.
This approach allows for maximum granularity and potential use in highly secure or tamper-evident storage systems (e.g., quantum-resistant drives or blockchain-based archives). However, this method comes with a notable trade-off and increases time for Data Writing.
Possible variants of realization as an application to mail or messenger on the phone, also a variant of addition to the browser, where already by ready keys will be encrypted messages in packets for sending.
Encrypted
Demonstration
The goal is to use the cipher with quantum technologies. The cipher can theoretically be implemented in a bit-level data writing format, where each bit of the encrypted message is stored or written individually.
Encrypt Text
and get Reward
Simplier version of A21. Send your results to our email address if you decrypt the text you win a reward (bounty grows every week).
FAQ
How the cypher is planned to be used in practice?
How it would work for sending messages?
If we take an example like Email-Client in a browser, after installing the addon-extension, you could highlight the text and select the “encrypt” option. A key and encrypted text would be generated to the user. To decrypt the message, the recipient would need to use the same key as the sender of the message. The key can be shared even from hand to hand using Flash-USB drive or by using other methods.
Will it be possible to encrypt large data?
Why it’s potentially quantum-resistant?
Is it possible to use a cipher with 64-bit computing?
What does that mean, A21 or A22 etc?
A stands for Algorithm
The numbers after A are the versions of the algorithm for encrypting the data.
The first successful version was A21, all previous versions lacked the necessary features and were quite vulnerable. But this is not the limit and work continues.