Zeq Security Protocol (ZSP)
The Zeq Security Protocol (ZSP) is the unified security layer that wraps every sensitive operation in the Zeq ecosystem. It uses a triple-kernel encryption envelope derived from the HULYAS Spectral-Topological Equation.
Triple-Kernel Architecture
Every ZSP envelope combines three independent encryption kernels:
K(x,x',t,t') = K_spectral(x,x') × K_temporal(t,t') × K_chaos(x,x',t,t')
K_spectral — Frequency-Domain Diffusion
Decomposes data into spectral components using the HZC algorithm. Each frequency band is encrypted independently, making partial decryption mathematically impossible.
K_temporal — Time-Locked Keys
Keys are synchronised to Zeqond ticks (0.777s intervals). A key is only valid during its Zeqond window. After the window expires, the key self-invalidates. Uses GR35 (time dilation) for relativistic key scheduling.
K_chaos — Deterministic Chaos
Generates the chaos component using QM8 (quantum tunneling coefficients) as a deterministic but unpredictable seed. The tunneling probability function creates a chaotic but reproducible keystream.
Operators Used
ZSP employs 18 operators from the core spectrum:
| Operator | Role in ZSP |
|---|---|
| KO42 | Master metric alignment (mandatory) |
| QM8 | Tunneling coefficients for chaos kernel |
| CS47 | Shannon entropy for key strength verification |
| XI1 | Information density measurement |
| GR35 | Time dilation for temporal key scheduling |
| PSI96 | Phase modulation for envelope signing |
| ON0 | Envelope integrity verification |
Where ZSP Is Used
- Zeq Message: Every message wrapped in ZSP before transmission
- Zeq Mail: Zeq-to-Zeq emails use ZSP envelopes
- ZeqAuth: Authentication tokens protected by ZSP
- HZC Compressor: Uses the same K_spectral kernel for spectral compression
- Compute API: ZeqProof receipts are ZSP-signed
Related
ZSP Security App · ZeqAuth · Awareness Operators · QM Operators