Geometric Cryptography
The key is not a password. The key is geometry.

Encryption hides the contents of a message. Geometric cryptography hides the existence of it.

A shuffled deck of 52 cards has never been arranged the same way twice in human history. 8×1067 possible combinations. One image. 360 orientations. The same principle.
acetilt.app — controls
Leave blank to use the generated white lattice image.

Encode

Decode
orientation compass
Active orientations
Encode in Advanced mode to see orientations
system — readme
How it works

Acetilt encodes a secret message into the least-significant bits of a carrier image's blue channel at pixel locations defined by a lattice — a periodic grid generated from a 2×2 integer matrix B.

In Advanced mode, the lattice is also rotated by an angle θ. Recovery requires both B and θ. Neither alone is sufficient.

Keyspace

The cryptographic key is the pair (B, θ). Security arises from the combinatorial explosion of valid basis matrices and the 360 discrete orientations — not from secrecy of the algorithm.

This satisfies Kerckhoffs's principle: the method is public; only the key need be secret.

Enterprise mode

Multiple image stacks. Each decoded by correct orientation sequence. The key is not a password. The key is geometry.

Coming soon
Acetilt demonstrates a geometric steganographic cryptographic primitive in which a lattice basis matrix B and rotational orientation θ together constitute a cryptographic key. Security is guaranteed by the mathematical keyspace of valid basis matrices and orientations — not by secrecy of method. This satisfies Kerckhoffs's principle. The underlying mechanism is the subject of UK patent applications GB2607919.4 (Geometric Data Vessel) and GB2608126.5 (Geometric Data Computing). Patent pending. AINEXUS STUDIO LTD. All rights reserved.