OpenIDEO is an open innovation platform. Join our global community to solve big challenges for social good. Sign Up / Login or Learn more

Crypto Visuals

Use security & encryption algorithms to generate experimental abstract design & data-based computational animations through creative coding.

Photo of Toni Mitjanit

Written by

Sketch 1 (1,500 characters)

The main idea behind this sketch is "visualize how security and encryption algorithms work". Throught the implementation of computational rules based on security algorithms and setting an abstract visual language (shapes, colors, lines, forms, sounds, ...). Concepts such as data, encryption, symmetry, keys, encapsulation, networks, communication, protocol, ... have to be represented visually using this particular abstract language. Through creative coding I could generate parametric, abstract visuals (designs and animations) and generative music that suggest how encryption (3DES, RSA or Blowfish) or security protocols work. Encryption is essentially a code used to hide the contents of a message or data. It could be amazing to visualize its process and result. And it also could be interesting think about how to represent concepts such as encryption, hashing or salting.

Sketch 2 (1,500 characters)

The main idea behind this sketch is "security save our personal data". Without security we can loose our privacy. It could be represented by personal data (emails, text messages, photos, videos, speech messages, ...) that are being corrupted or stolen by some kind of algorithm. I could use encryption or glitch algorithms (databending, datamoshing, dithering, pixel sorting, compression) to distort, pixelate or deform portions of different kind of media (images, videos and sound or music).

What have you learned through this sketching process? (1,000 characters)

I just scratched the surface of concepts such as security, encryption or privacy. I'm really interested in learn about how security algorithms and protocols work, and try to create an appealing visual language to explain how they work.

Tell us more about you. (1,000 characters)

I'm a generative designer, experimental animator and creative coder. I'm Bachelor in Computer Science in 2002 by Universitat de les Illes Balears (UIB), Ph-Degree in Computer Graphics on Internet in 2002 by FUEIB, Master in Multimedia Production & Creation in 2007 by Universitat Oberta de Catalunya (UOC), Degree in Photography in 2010 by Escola Superior de Disseny de Palma (ESD). I've been working at the level of media, video art, computational art, generative design and experimental animation regularly since 2010. I explore innovative audiovisual expressive ways through creative coding using data visualization, human/machine interaction, autonomous agents, physics and randomness. All my audiovisual creations are produced by coding my own software in different programming languages (Processing, Java, C++, SuperCollider, ChucK).

Why are you participating in this Challenge? (750 characters)

I want to learn and explore security and encryption algorithms from experts to produce experimental generative designs and computational animations. I think cyber security can be an amazing field to explore and produce surprising visuals.

Website(s)

http://coderspaghetti.wordpress.com https://vimeo.com/spaghetticoder https://www.instagram.com/spaghetticoder77/ https://twitter.com/CoderSpaghetti https://www.facebook.com/CoderSpaghetti

What is your experience with the field of cybersecurity?

  • I have never worked in cybersecurity before but am excited to learn more and get involved.

What best describes you?

  • Other

How did you hear about this OpenIDEO Challenge?

  • In the news

Location: City

Manacor

Location: State / District

Balearic Islands

Location: Country

  • Spain

13 comments

Join the conversation:

Comment
Spam
Photo of Mistor Matsyk

Online exchanges are all unique, and each person has their own goals, and concepts of safety. When choosing a cryptocurrency exchange, it's important to consider fees, liquidity, accessibility as well as your own personal preferences. Here is my best way to exchange https://inanomo.com/en

Spam
Photo of Ben Banks

Awesome work. The sandox visualisation is (for me) a highlight. I'd be fascinated in understanding what sources the process take (obviously typographical) and, may'be, applying the transformations to simple icons/pictograms. The juxtaposition of transformation and a pictogram might give more of a hook to draw people into the abstraction. I'd happily talk about encryption. I do think there is a slightly philosophical problem in this challenge. The whole point of encryption is to render original content meaningless. Directly morphing visual elements in an encryption process is likely to destroy that meaning. Most visualisations of encryption work better by deforming images so they are only coherent from one particular view point. Or that they start coherent, deform and reform meaningfully.

Spam
Photo of Toni Mitjanit

Thanks Ben for your comment!
I completely agree with your sentence "The whole point of encryption is to render original content meaningless". In fact I will try to reduce abstraction and preserve some areas or silhouettes to help the observer recognize what is happening on the screen and make "encrypted" images more readable..

Spam
Photo of Ben Banks

Toni. Thanks for taking on board the commentary. I really - really- like them. I would love to work with you on making the sounds/soundtrack to help anchor the visual elements. I know this is a visualisation challenge but we live in a multimedia world.......

Spam
Photo of Toni Mitjanit

Thanks Ben for your reply. It could be nice work together in the challenge.
I don't know yet if my idea is going to be selected.

I thought to create music algorithmically using Chuck (http://chuck.cs.princeton.edu/), a programming language for audio synthesis and computational music composition. And I thought to create visuals using Java + Processing (https://processing.org/). And I would syncronize visuals and sounds through OSC protocol.

How can we work together? How is your music composition process and tools?
What's your idea for music composition?

Spam
Photo of Ben Banks

Toni. I may need a little time to come up with some reasonable suggestions. But there are two thoughts in my mind. One is a mentronomic element (clock tick for example) with a simple melody drawn through. Two was a soundscape of conversations (perhaps made from the words in the visuals) that start of as understandable and become jumbled and disjointed (like hearing snippets of conversations as you walk around) and become understandable again. Tooling wise I’m not really a fan of generative music, but use the usual selection of Logic Pro, midi guitar and software synths. Can timecode to anything, or simply use the audio signal as a part of the visual generator?

Spam
Photo of DeletedUser

DeletedUser

Very unique approach and idea. I am a little confused though. Are any of the alternate images the inputted data prior to encryption? Am I mistaken that the image of Sketch 1 is the output of applying hash and encryption algorithms to inputted data, then transforming the output to an image format? Looks like a new art form to me. Bravo.

As a fellow entrant, I invite you to visit my submission and let me know what you think. https://challenges.openideo.com/challenge/cybersecurity-visuals/review/what-is-appropriate-encryption

Best of luck.

John Messing

Spam
Photo of Dima Boulad

Toni Mitjanit This is beautiful extensive work! I really appreciate you pushing the boundaries of the challenge and showing us the beautiful animation work. Somehow your process reminded of Finlay Paterson 's approach in this submission: Smart Dust & Nano Tech in using abstraction to relate a very complex world. Wondering how we can discuss together how abstract imagery can be tied together to relate a concept to the person who doesn't understand cybersecurity concepts?

Spam
Photo of Toni Mitjanit

Thanks Dima Boulad  for your comment.

The idea behind the abstract imaginary is based on this process:

1) Taking a set of data, such as the color information from pixels in an image or video, the frequencies from an audio file, or the characters from a text.
2) Getting its encrypted representation using an encrytion algorithm (SHA-1 for example),
3) Matching every hexadecimal digit from encryption to a visual abstract alphabet (for example, color shapes similar to Bauhaus visual alphabet).
4) Animating this process line by line using a cellular automata.

The process will be dynamic, progressive and illustrative to educate the observer.
Maybe we can arrange an Skype or just exchange emails or comments using this platform.

Spam
Photo of Kyle Jochai

Wonderful visuals. The idea of abstracting an image in a familiar way (paint or other traditional media) is intriguing to me and is a good way of drawing out meaning in a technical topic. You could also play with scale to show a more literal meaning or picture; ie zoom out on an abstract image until something recognizable appears.

Spam
Photo of Toni Mitjanit

Thanks Kyle for your comment. I will consider your idea of changing the scale of visualization to make something recognizable appear from something abstract. Good idea!

Spam
Photo of Thomas Grimer

Beautiful work

Spam
Photo of Toni Mitjanit

Thanks Thomas for your nice words.