AIResearch AIResearch
Back to articles
AI

AI Uses 3D Shapes to Create Unbreakable Codes

A new encryption method hides secret keys inside complex 3D structures, offering a fresh approach to quantum-proof security—but experts warn it's still experimental.

AI Research
March 26, 2026
4 min read
AI Uses 3D Shapes to Create Unbreakable Codes

In the race to develop encryption that can withstand quantum computers, researchers are exploring unconventional ideas beyond traditional mathematics. A new experimental system called HyperFrog takes a novel approach by embedding secret keys within intricate 3D shapes, specifically voxel grids that resemble digital building blocks. This aims to create a post-quantum key-encapsulation mechanism (KEM), a type of encryption for securely sharing keys, by leveraging the complex topology of these shapes as a hidden trapdoor. Unlike standardized schemes that rely on uniform random bits, HyperFrog conditions its secrets on geometric properties, offering a fresh perspective on how cryptographic security might be engineered in the quantum era.

The core of HyperFrog is that a secret key can be derived from a voxel shape—a 3D grid of occupied and empty cells—with specific topological constraints, rather than from a random bitstring. The researchers mine these shapes by repeatedly generating random 16x16x16 voxel grids until one satisfies stringent criteria: it must have a high cycle rank, a measure of loopiness in its adjacency graph, and a controlled density to avoid being too sparse or too full. For example, the default parameters require a cycle rank of at least 8 and a population between 1200 and 2600 out of 4096 possible voxels. This mined shape is then flattened into a binary vector and used in a learning-with-errors (LWE) framework, where the public key is computed as b = As + e (mod q), with A as a matrix, s as the secret vector, and e as small noise. The innovation lies not in the LWE core, which follows standard techniques, but in the key space engineering, where the secret is a combinatorial object with explicit digital-topology properties.

To implement this, ology involves a multi-step process detailed in the paper. First, key generation uses a rejection-sampling algorithm called TopoMine to produce the voxel secret s, which must meet the cycle-rank and density constraints. This is followed by expanding a public matrix A from a seed using a pseudorandom generator like ChaCha20, and adding centered binomial noise e to compute b. Encapsulation then employs a sparse row-subset mechanism: for each of 256 message bits, it selects 64 rows from A, sums them with noise, and combines them with the public key to form ciphertext components u and v. A Fujisaki-Okamoto transform is applied for chosen-ciphertext security, using hash functions modeled as random oracles to derive a shared key and authenticate the ciphertext. Decapsulation recovers the message by computing inner products with the secret s and checking a tag, all designed to be constant-time to prevent side-channel attacks.

From an optimized C++ implementation, as reported in the paper, demonstrate the feasibility of this approach. Benchmark data shows that key generation is dominated by the mining step, with times influenced by rejection sampling, while encapsulation and decapsulation are fast, operating in the low-millisecond range on a system like an AMD Ryzen 9 5950X. For instance, Figure 2 in the paper illustrates a performance profile where key generation involves precomputation, and the fast-path operations are efficient. However, the ciphertext size is notably large—approximately 2.1 MB in the current design—due to storing full vectors for each message bit, as highlighted in Figure 3 comparing HyperFrog to standardized KEMs like ML-KEM-1024. The paper also includes visualizations, such as Figure 4, showing an example mined voxel shape, and provides statistical diagnostics to support correctness, with decoding failure probabilities estimated as negligible under the given noise bounds.

This research matters because it probes new directions in post-quantum cryptography, moving beyond optimized lattice-based schemes to explore how geometric structure can inform security. For everyday readers, it represents a step toward diversifying encryption s that could one day protect digital communications against quantum threats, though it's not yet ready for real-world use. extend to fields like data security and network protection, where innovative key distributions might offer resilience against future attacks. By framing the secret as a topological object, HyperFrog encourages a rethink of how entropy and hardness are conceptualized in cryptographic systems, potentially inspiring further interdisciplinary work between computer science and digital geometry.

Despite its promise, HyperFrog has significant limitations that the paper openly acknowledges. The system is research-grade and has not undergone extensive public cryptanalysis, with the authors warning against using it to protect real-world assets. Key concerns include the potential for biases in the secret distribution due to the topological conditioning, which might be exploitable by statistical or algebraic attacks, as discussed in Section 7.4. The reduced entropy from rejection sampling, though bounded in Appendix A, raises questions about LWE hardness under this non-uniform distribution. Additionally, the large ciphertext size is a practical drawback, and side-channel risks, though mitigated by constant-time operations, require further evaluation. Future work, as outlined in the conclusion, will focus on cryptanalysis, ciphertext compression, and parameter exploration to address these issues and refine the design.

Original Source

Read the complete research paper

View on arXiv

About the Author

Guilherme A.

Guilherme A.

Former dentist (MD) from Brazil, 41 years old, husband, and AI enthusiast. In 2020, he transitioned from a decade-long career in dentistry to pursue his passion for technology, entrepreneurship, and helping others grow.

Connect on LinkedIn