Process Key in Maria System — Technical & Conceptual Analysis

Maria System does not use a key in the classical sense — it does not rely on a static bit string shared across the entire message. Instead, it uses a dynamic process key, created during system execution and inseparable from the symbol deformation process.

This approach is fundamentally different from AES, RSA, ECC and classical cryptographic methods, where the key:

In Maria System, the key does not exist as data — it exists only as a process.


1. What is a process key?

A process key is a set of dynamic parameters that create a unique deformation context for each individual symbol.

Process key = a deformation state that arises during symbol processing and never exists as a single storable entity.

This is a fundamental difference:


2. Components of the process key

2.1 Deformation trajectory

A sequence of binary transitions describing how a symbol decays in the deformation rhythm.

This is the “movement map” of the symbol that the receiver must reconstruct.

2.2 Deformation indexes (variable length n)

Each character has its own number of bits n:

Variable length = variable local per-symbol key.

This already provides resistance similar to One-Time Pad, but generated procedurally.

2.3 Deformation phases

The external file fazy_deformacyjne.txt acts as a “trajectory dictionary”.

2.4 Deformation rhythm and step ΔF

A time/sequential factor that changes how trajectories are interpreted.

It may depend on:

The rhythm is an extra source of entropy.

2.5 Interpretation mechanics

Each of the above would be only a parameter on its own. The process key appears only when the interpretation logic becomes part of the key.

How the system uses:

… is itself part of the key.


3. Why is this a key?

In cryptographic classification:

A key is any parameter necessary to reverse a transformation.

In Maria System, in order to recover the original symbol, the receiver must have:

Without these, not even a single character can be recovered.

This fully satisfies the definition of a cryptographic key.

The difference is that the key is:


4. Comparison with a classical key

Feature Classical key Process key (Maria System)
Form static bit string dynamic process state
Number of keys one per message one per symbol
Existence before and after only during execution
Extractability high practically zero
Leak impact catastrophic useless
Algorithm separation separate inseparable
Entropy constant grows with each symbol

5. Why is the process key more secure?

5.1 It cannot be stolen

Because it does not exist as data.

5.2 Each symbol has its own key

Impossible to achieve in static algorithms.

5.3 It keeps OTP advantages without OTP weaknesses

One-Time Pad (OTP) is theoretically perfect, but requires:

The process key applies the same logic, but generates keys locally and dynamically, without storage.

5.4 The attacker does not know what to look for

There is no single object called “the key”.

There is only a process.

5.5 Partial leaks give nothing

Example: an attacker obtains the phase library.

Without:

…it is useless.


6. Formal definition of the process key

(easy to quote in technical papers)

A process key is a set of dynamic deformation states that arise during symbol processing and determine its final representation. The process key does not exist as a static value, is not stored, and is not transmitted — it is generated and consumed in real time during algorithm operation.


7. Executive summary

Maria System does not use a classical key.

Instead, it uses a process key that emerges during the processing of each character.

This key is distributed across trajectories, phases, rhythms and indexes.

It does not exist as a file, number or bit string.

It is practically impossible to steal and cannot be stored.

Each symbol has its own unique key, providing security unavailable in classical algorithms.

This is a completely new key model, unique to Maria System.