Skip to main content

Zeq Security Protocol (ZSP)

The Zeq Security Protocol (ZSP) is the unified security layer that wraps every sensitive operation in the Zeq ecosystem. It uses a triple-kernel encryption envelope derived from the HULYAS Spectral-Topological Equation.

Triple-Kernel Architecture

Every ZSP envelope combines three independent encryption kernels:

K(x,x',t,t') = K_spectral(x,x') × K_temporal(t,t') × K_chaos(x,x',t,t')

K_spectral — Frequency-Domain Diffusion

Decomposes data into spectral components using the HZC algorithm. Each frequency band is encrypted independently, making partial decryption mathematically impossible.

K_temporal — Time-Locked Keys

Keys are synchronised to Zeqond ticks (0.777s intervals). A key is only valid during its Zeqond window. After the window expires, the key self-invalidates. Uses GR35 (time dilation) for relativistic key scheduling.

K_chaos — Deterministic Chaos

Generates the chaos component using QM8 (quantum tunneling coefficients) as a deterministic but unpredictable seed. The tunneling probability function creates a chaotic but reproducible keystream.

Operators Used

ZSP employs 18 operators from the core spectrum:

OperatorRole in ZSP
KO42Master metric alignment (mandatory)
QM8Tunneling coefficients for chaos kernel
CS47Shannon entropy for key strength verification
XI1Information density measurement
GR35Time dilation for temporal key scheduling
PSI96Phase modulation for envelope signing
ON0Envelope integrity verification

Where ZSP Is Used

  • Zeq Message: Every message wrapped in ZSP before transmission
  • Zeq Mail: Zeq-to-Zeq emails use ZSP envelopes
  • ZeqAuth: Authentication tokens protected by ZSP
  • HZC Compressor: Uses the same K_spectral kernel for spectral compression
  • Compute API: ZeqProof receipts are ZSP-signed

Related

ZSP Security App · ZeqAuth · Awareness Operators · QM Operators