Lunaris Encryption

Interactive Visualization & Analysis

System Overview

Input Processing
Validates input text and prepares for character-by-character processing
Salt Generation
Creates 16-byte cryptographically secure random salt for key derivation
Character Mapping
Substitutes each character using predefined 2-symbol combinations
Master Key Layer
Optional PBKDF2 key derivation + XOR encryption for enhanced security
Key Characteristics

Character Set: Uses 8 special characters (./_-+=!~) for all mappings

Expansion Ratio: ~2x for ASCII, variable for Unicode characters

Security: Two-layer approach with optional cryptographic enhancement

Interactive Demo

Real-Time Encryption Visualization

H
Input
+!
Encrypted
Original Text
Hello World!
Encrypted Output
+!.=/=/=_.==!~_+/=.!!.!!!

Step-by-Step Process

Ready to encrypt...
Click "Encrypt" to see the detailed process

Character Mapping Matrix

Complete Mapping Reference

Click any cell to see the mapping details. Hover to highlight.

Character Frequency Analysis

Shows the frequency distribution of characters in your input text:

Encryption Analysis

62 Total Mappings
2.0x Expansion Ratio
8 Symbol Set Size
2 Security Layers
Character Distribution by Type
Encryption Symbol Usage

Complexity Analysis

Mathematical analysis of the Lunaris encryption system:

Possible 2-char combinations
62 Used combinations
96.9% Mapping efficiency
2^128 Salt keyspace

Security Analysis

Multi-Layer Security Architecture

Layer 1: Character Substitution
Function: 1:1 character mapping using 8-symbol alphabet
Security: Provides obfuscation, vulnerable to frequency analysis
Strength: Low to Medium (depends on text length and patterns)
Layer 2: PBKDF2 Key Derivation
Function: SHA-256 based key derivation with 100,000 iterations
Security: Cryptographically secure, resistant to brute force
Strength: High (when combined with strong master key)
Layer 3: XOR Encryption + Base64
Function: XOR cipher with derived key + Base64 encoding
Security: Adds cryptographic protection over substitution
Strength: Medium to High (depends on key quality)
Security Strength by Configuration
Attack Resistance Timeline
Security Considerations

Character mapping alone is not cryptographically secure and should be considered obfuscation rather than encryption.

With master key, the system provides reasonable security for non-critical applications but should be combined with established standards for sensitive data.

Performance Metrics

Encryption Performance Analysis

Processing Time vs Text Length
Memory Usage Analysis
Performance Characteristics

Time Complexity: O(n) where n is input length

Space Complexity: O(n) for storing mappings and output

Scalability: Linear scaling with input size