Category: Informational

The M.O.M. Obfuscation Method of Encryption

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”

This Internet-Draft will expire on 01 September 2025.

Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved.

Abstract

This document describes the M.O.M. Obfuscation Method of Encryption (M.O.M. Obfuscation) and its use in the encryption of data. M.O.M. Obfuscation is a method of encryption that is designed to be simple to implement and use, while providing a high level of security. M.O.M. Obfuscation is designed to be used in a wide variety of applications, including secure communication, data storage, and digital rights management.

Table of Contents

  1. Introduction
  2. M.O.M. Obfuscation Method of Encryption
  3. Units of Encryption
  4. Personal Interpretation
  5. Limitations
  6. Security Considerations
  7. IANA Considerations
  8. Author’s Addresses

Introduction

Since data became a valuable commodity, the need to protect it has been a priority. Cryptography has been used as the primary method to encrypt data up until this point. Concerns are starting to arise about the ability of Quantum Computing to crack these codes and make cryptography obsolete. The M.O.M. (M.O.M. Obfuscation Method) Obfuscation Method was create to address the shortcomings of cryptography and to provide a new method of encryption that is resistant to Quantum Computing. Moms have long be known for their tall tales and ability to translate informaiton that is conveyed to them into a totally different meaning. This is especially true when it comes to passing information from one mother to another. The M.O.M. Obfuscation Method is based on the same principles that mothers have used for centuries.

M.O.M. Obfuscation Method of Encryption

           +-+-+                   +-+-+
           |   |                   |   |
        -+-+-+-+-+-             -+-+-+-+-+-
        |   MOM   | --------->  |   MOM   |
        |         |             |         |
        -+-+-+-+-+-             -+-+-+-+-+-

The foundational principle of the M.O.M. Obfuscation Method of Ecryption is that our mothers tend to slightly alter a piece of informaiton that is passed to them. This slight alteration is enough to make the information unrecognizable to anyone who is not the intended recipient. The M.O.M. is an interative process that can be repeated as many times as necessary to ensure that the information is secure. It is by passing the informaiton through your mother that the informaiton is first obfuscated. It is then up to the network of moms to transfer the information from one mother to another until the informaiton reaches the mother of the person intended to receive the informaiton. The mother of the intended recipient is then able to reverse the obfuscation process and retrieve the original informaiton. The personal relationship between the mother and their child is what allows the informaiton to remain secure when travelling through the network of moms.

Units of Encryption

The M.O.M. Obfuscation Method of Encryption uses a unit of encryption called a mit. Mit stands for Mother Interpretive Translation. The mit is the smallest unit of encryption that can be used in the M.O.M. Obfuscation Method. A mit consists of one single mother’s interpretation of a piece of informaiton. This means that only a message from people sharing a mother can have single mit encryption. The more mits, the more mothers involved in the process, and thus the more secure the informaiton is. A the level of mits should be evaluated before sending informaiton to ensure that the informaiton is secure. A message to your sibling would require a single mit, while a message to your cousin would require two mits. A message to your second cousin would require three mits, and so on. When sending information outside of your familial unit, the number of mits should be increased significatly. The recommended number of mits for your encrption should align with the current standard for encryption, with the mit replacing the bit as the unit of encryption.

                3-mit Encryption    +-+-+               +-+-+               +-+-+    |   |               |   |               |   | -+-+-+-+-+-         -+-+-+-+-+-         -+-+-+-+-+- |   MOM   | ----->  |   MOM   | ----->  |   MOM   | |         |         |         |         |         | -+-+-+-+-+-         -+-+-+-+-+-         -+-+-+-+-+-   

Personal Interpretation

One of the ways that the M.O.M. Obfuscation Method of Encryption is able to provide a high level of security is through the personal interpretation of the information by the mother. Only a child of this mother would be skilled enough to interpret what the truth is from the message conveyed from the mother. This is what makes the M.O.M. Obfuscation Method of Encryption so secure. The personal relationship between the mother and the child is what allows the informaiton to remain secure when travelling through the network of moms.

Limitations

While the mother in the M.O.M. does not need to be a biological mother, there are still those who do not have a maternal figure in their lives. Unfortunetly, the M.O.M. does not work with most paternal figures. Another limitation of this method of encryption is that a personal relationship with the mother is required. Without this connection, the final recipient of the information will not be able to properly decrypt the information.

Security Considerations

The M.O.M. Obfuscation Method of Encryption is designed to provide a high level of security. The personal relationship between the mother and the child is what allows the informaiton to remain secure when travelling through the network of moms. A threat to the M.O.M. model is the need for a personal relationship with the mother. Without this connection, the final recipient of the information will not be able to properly decrypt the information. The biggest obsticle to the M.O.M. is the use of social media. Just as mothers have been known to pass informaiton along to other moms by word of mouth, the same is true about social media. Mothers are known to share information about their children on social media, and this is a threat to the M.O.M. model. If the mother over shares information about their child, the information could be intercepted and decrypted by someone who is not the intended recipient.

IANA Considerations

This document has no IANA actions.

Author’s Address

Dr. Marshal A. Miller Email: [email protected]