The Biggest Milestone in the History of Cryptography is Quietly Upon Us
- Gideon Samid
- 2 days ago
- 5 min read
Updated: 12 minutes ago
Mathematical Insight is No Longer an Advantage
Cryptography from its very beginning was a mathematical game, the best mathematician took home the trophy, whether he or she were a cryptographer or a cryptanalyst. In fact, the attraction of the profession was based on the challenge to prove your mathematical superiority over your adversary. Math was the name of the game before computers and ever since. The profession went through serious revolutions, the biggest are (i) use of computers, and (ii) asymmetric cryptography, but through them all, the premise of mathematical advantage was an enduring constant.
And this is about to change. Alas, the profession behaves as it the new cryptography that renders mathematical talent irrelevant does not exist.
Dethroning mathematics from the practice of cryptography is such a showstopper, such a paradigm change that cryptographers instinctively embrace denial, look the other way, pretend it is not happening. Academic cryptographers spend their best years building up mathematical complexity to frustrate the opposing mathematician, or to crack the mathematical complexity presented as a challenge by an adversarial mathematician. If mathematical insight is no longer the name of the game then lifetime of efforts are no longer a credit. One should not expect academia to let go without a fight.
It is worse for national defense. From its inception the National Security Agency used a simple modus operandi: get the adversary to use ciphers that appear to serious cryptographers as hard and secure, while secretly cracking them and reading the enemy's mail. This strategy was based on building a pool of unmatched hidden mathematical talent that used its advantage to distinguish itself over its adversaries. The glorious (mostly still stealth) history of the NSA proves the efficacy of this smarter mathematician strategy. If math insight becomes irrelevant then the National Security Agency will have to recalibrate its operation, and find a replacement to its current winning strategy.
What happened? How did math lose its grip on cryptography?
All along mathematics worked with a partner: randomness: pattern-devoid data. It was a junior partner. Randomness was expressed through a known-size key drawn from a large but finite key space, subject to brute force cryptanalysis. Everything beside this key was pattern-bearing mathematical complexity. To generate an effective ciphertext from a given plaintext two ingredients were deployed: a pattern-devoid element (the randomized key), and a pattern-bearing element: the algorithmic construction, the non-randomized parameters.
[Ciphertext] = f[ Plaintext, Pattern-Devoid Ingredient, Pattern-Bearing ingredient ]
Historically the field evolved towards minimizing the pattern-devoid element (smaller keys), and boosting the pattern-bearing element (smart math). The smart math became the battlefield favoring the superior mathematician. Until recently it was difficult to secure a rich supply of high-quality randomness, but now with the migration to cyberspace maturing, it is getting very easy to use large quantities of high-quality randomness. (Advanced algorithms, complex physical contraptions, and quantum randomness). Randomness is considered cyber oil, powering up cryptographic engines. This new "oil" called for matching ciphers. A new class of ciphers was steadily developed, aiming to minimize the pattern-bearing ingredient (the math), and maximize the pattern-devoid ingredient (the randomness). Math is vulnerable to a smarter mathematician; high-quality randomness voids the advantage of mathematical talent. By tipping the scales to generate ciphertext from pattern-devoid ingredient versus pattern-bearing ingredient, one decreases their cipher's vulnerability to an attacker smarter than they are.
The emerging new class is properly dubbed: pattern-devoid cryptography (PDC): ciphers designed to minimize pattern-bearing elements and maximize pattern-devoid elements. Typical PDC ciphers replace arbitrary specifics with random choices. They deploy randomized-size key. Rather than using the full key for every instant of encryption, PDC ciphers select a random portion of the key, every time the key is used. Rather than replace a given plaintext letter with a specified ciphertext letter, PDC ciphers use a randomized choice among ciphertext replacement options. Pattern devoid ciphers tend to be decoy-tolerant. A decoy tolerant cipher, DTC, allows the content-bearing bits of a ciphertext, to be mixed with noise -- contents-devoid bits, and generate a decoy ciphertext of randomized size. The recipient of the decoy ciphertext will readily discard the noise, and process only the contents-bearing bits, while an attacker will have to treat the entire decoy ciphertext as potentially content bearing. Decoy tolerant ciphers allow the transmitter to inject unilateral randomness, and do so to the degree deemed necessary, without pre-coordination with the recipient.
These are some of the means used by pattern-devoid ciphers to void the advantage of mathematical insight. The specifics are readily available in a new peer-reviewed book, in the public record of some three dozen patents, and in other references, see below. The emphasis in this writing is on the fact that cryptography is reaching its biggest milestone ever, and the cryptographic establishment is not preparing itself to the new era where math talent and advanced computing power is no longer the determinant factor.
We see the signs of stealth use of pattern-devoid cryptography, mostly in China, Russia, Iran, Hamas. The horrifying strategic surprise pulled by Hamas against Israel on October 7, 2023 was so successful, as recently reported, because Hamas used the 'recommended' pattern-bearing ciphers to feed Israel with false misleading information, (assuming Israel's venerable cryptanalysis cracks them) while using unbreakable pattern-devoid cryptography to communicate war plans. What is the next painful surprise awaiting western civilization from cryptographers alert enough to what is happening in their field?
The following tale sharpens the message. Alice and Bob are playing a game where each in turn is tossing two dice, and the other guesses the outcome between 2 and 12. Alice being mathematically smart she guesses 7 each time, Bob being not so smart, is guessing differently each time. They play several rounds each evening, and lo and behold Alice trounces Bob using her mathematical advantage. She knows that the chance for 7 is six times the chance for 12. Frustrated Bob introduces a small change to the game: tossing one die only. This tiny change voids the pattern-bearing element of the game, and constitutes it on pure randomness (pattern devoid ingredient). Immediately Alice loses her advantage, no matter what a great mathematician Alice, no matter how math-stupid Bob, Alice is no longer the predominant winner.
This level-playing field, this defanging of the NSA, is what is coming upon us, and we don't even talk about it. How will these days look to us in hindsight??

Reference
For the raw, detailed data regarding pattern-devoid cryptography please search for about 40 US patents, available online (Inventor: Gideon Samid). For a thorough overview of pattern-devoid cryptography (PDC) please read the new peer-reviewed book, chapter:
"Pattern Devoid Cryptography" https://www.intechopen.com/online-first/pattern-devoid-cryptography
For later publications please peruse the least below:
Lifeboats on the Titanic Cryptography https://eprint.iacr.org/2025/587
Transmitting Secrets by Transmitting only Plaintext. https://eprint.iacr.org/2025/438
"Tesla Cryptography:" Powering Up Security with Other Than Mathematical Complexity. https://eprint.iacr.org/2023/803
AI Resistant (AIR) Cryptography. https://eprint.iacr.org/2023/524
The Prospect of a New Cryptography: Extensive use of non-algorithmic randomness competes with mathematical complexity. https://eprint.iacr.org/2023/383
FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm https://eprint.iacr.org/2021/458
Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers. https://eprint.iacr.org/2024/129
Polar Lattice Cryptography. https://eprint.iacr.org/2025/452
Cryptographic Key Exchange: An Innovation Outlook https://eprint.iacr.org/2023/1372
Randomness as Absence of Symmetry THE 17TH INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE ENGINEERING (IKE'18: JULY 30 - AUGUST 2, 2018, LAS VEGAS, USA)
NEPSAR: Secure Key Exchange https://www.bitmintalk.com/nepsar
Military and political implications of pattern-devoid cryptography are handled through a newly published fictional account "The Cipher Who Came in from the Cold". https://www.bitmintalk.com/thriller
