OpenIDEO is an open innovation platform. Join our global community to solve big challenges for social good. Sign Up / Login or Learn more

Crypto Visuals

Use security & encryption algorithms to generate experimental abstract design & data-based computational animations through creative coding.

Photo of Toni Mitjanit

Written by

Sketch 1 (1,500 characters)

The main idea behind this sketch is "visualize how security and encryption algorithms work". Throught the implementation of computational rules based on security algorithms and setting an abstract visual language (shapes, colors, lines, forms, sounds, ...). Concepts such as data, encryption, symmetry, keys, encapsulation, networks, communication, protocol, ... have to be represented visually using this particular abstract language. Through creative coding I could generate parametric, abstract visuals (designs and animations) and generative music that suggest how encryption (3DES, RSA or Blowfish) or security protocols work. Encryption is essentially a code used to hide the contents of a message or data. It could be amazing to visualize its process and result. And it also could be interesting think about how to represent concepts such as encryption, hashing or salting.

Sketch 2 (1,500 characters)

The main idea behind this sketch is "security save our personal data". Without security we can loose our privacy. It could be represented by personal data (emails, text messages, photos, videos, speech messages, ...) that are being corrupted or stolen by some kind of algorithm. I could use encryption or glitch algorithms (databending, datamoshing, dithering, pixel sorting, compression) to distort, pixelate or deform portions of different kind of media (images, videos and sound or music).

What have you learned through this sketching process? (1,000 characters)

I just scratched the surface of concepts such as security, encryption or privacy. I'm really interested in learn about how security algorithms and protocols work, and try to create an appealing visual language to explain how they work.

Tell us more about you. (1,000 characters)

I'm a generative designer, experimental animator and creative coder. I'm Bachelor in Computer Science in 2002 by Universitat de les Illes Balears (UIB), Ph-Degree in Computer Graphics on Internet in 2002 by FUEIB, Master in Multimedia Production & Creation in 2007 by Universitat Oberta de Catalunya (UOC), Degree in Photography in 2010 by Escola Superior de Disseny de Palma (ESD). I've been working at the level of media, video art, computational art, generative design and experimental animation regularly since 2010. I explore innovative audiovisual expressive ways through creative coding using data visualization, human/machine interaction, autonomous agents, physics and randomness. All my audiovisual creations are produced by coding my own software in different programming languages (Processing, Java, C++, SuperCollider, ChucK).

Why are you participating in this Challenge? (750 characters)

I want to learn and explore security and encryption algorithms from experts to produce experimental generative designs and computational animations. I think cyber security can be an amazing field to explore and produce surprising visuals.


What is your experience with the field of cybersecurity?

  • I have never worked in cybersecurity before but am excited to learn more and get involved.

What best describes you?

  • Other

How did you hear about this OpenIDEO Challenge?

  • In the news

Location: City


Location: State / District

Balearic Islands

Location: Country

  • Spain


Join the conversation:

Photo of Mistor Matsyk

Online exchanges are all unique, and each person has their own goals, and concepts of safety. When choosing a cryptocurrency exchange, it's important to consider fees, liquidity, accessibility as well as your own personal preferences. Here is my best way to exchange

View all comments