ZME1™ Container ZEQ-256™ Equation AES-GCM-256 Dual-Key: Password + Pattern Image

Two Platforms. One Equation.

ZMath is a dual-key encryption system that combines your password with a pattern image to derive strong keys using the ZEQ-256™ equation and produce encrypted artifacts in the ZME1™ container format. Choose Portable mode to decrypt anywhere, or Exclusive mode to cryptographically bind decryption to the ZMath network for controlled access.

ZMath Dual-Key Encryption: ZME1™ container · ZEQ-256™ derivation · Portable and Exclusive modes.

The Two Platforms

Pick the trust model that fits your workflow.

Portable Mode — Decrypt Anywhere

Encrypt on your device and decrypt on any device that has the correct password and pattern image. Ideal for personal archiving and cross-device portability.

  • Client-side key derivation with ZEQ-256™ (password + pattern image).
  • Authenticated encryption with AES-GCM-256.
  • Outputs self-contained ZME1™ containers.
  • No server dependency to decrypt; carry your secrets with you.

Exclusive Mode — Server-Bound Access

Decryption can be cryptographically bound to the ZMath network, enabling on-site decryption only. Useful for teams, revocation, and access control.

  • Same dual-key derivation via ZEQ-256™; decryption gated by server policy.
  • Team workflows, on-platform auditability & controlled sharing.
  • AES-GCM-256 sealed data within ZME1™ containers.
  • Great for “must-not-leave” environments.

How ZMath Protects Your Data

Dual-Key Derivation (ZDKD-1)

Your password and pattern image are independently processed, mixed via the ZEQ-256™ equation, then finalized by a hardened key schedule (ZHKDF-256) to produce encryption keys. This design resists guessing and leaks in either factor.

Container Format: ZME1™

ZME1™ is a self-contained, future-proof container that stores authenticated ciphertext, salts, nonces, and algorithm tags—designed for auditability and long-term readability.

Authenticated Encryption

ZMath uses AES-GCM-256 for confidentiality and integrity, ensuring that tampering is detected on decryption.

Client-Side First

All key derivation and encryption operations are designed to run in-browser on your device so secrets don’t leave your machine unless you choose to share the resulting ZME1™ file.

FAQ

What’s the difference between Portable and Exclusive?

Portable lets you decrypt anywhere with the correct password + pattern image. Exclusive can require ZMath-network authorization to decrypt, enabling revocation and on-site-only access for teams.

Do I need the same image every time?

Yes. The exact pattern image is part of the secret. If you lose it or your password, the data cannot be recovered.

Can I convert between modes?

You can re-encrypt a decrypted file into the other mode. For Exclusive→Portable you’ll need authorization to decrypt first.