As for cryptographic research: ... to whom it may concern Dear internet Partner,
the attached files are meant not as a "paper" within the field of the tight organized cryptographic discipline but rather as a discussion contribution for the advancement of cryptography. Details are presented in the following articles: http://www.telecypher.net/ENBytesys.pdf (English) http://www.telecypher.net/DEBytesys.pdf (deutsch) http://www.telecypher.net/Codingma.pdf (English) http://www.telecypher.net/Codierma.pdf (deutsch) The herein described "CypherMatrix" procedure is grounded on the roots of cryptographic as used since centuries. The method uses bytes only, simple mathematics including MODULO calculation and number systems from on base 2 up to on base 256. Anybody who wants to share with my thoughts may give me an echo. With internet greetings Ernst Erich Schnoor Munich (Germany) eschnoor at multi-matrix.de