Draft:Serhat Özyılmaz

Preface

Crypto algorithms work based on a certain origin and represent the relationship between the lowest point and the highest level point. The contact between two different points is connected to a certain cycle and releases energy at the possible collision point. This energy is called the secondary inert force due to energy conservation. Secondary inert forces depend on a series of sequences and are overcome from the obstacle we call the threshold. After the overcoming point, the force is applied again to the bottom point. This force is called the cryptography force.