Published March 9, 2026 | Version v1
Dissertation Open

The Sarrus Isomorphism: Harmonic Alignment and Topological Crystallization in Matter, Biology, and Cryptography

Description

The Sarrus Isomorphism: Harmonic Alignment and Topological Crystallization in Matter, Biology, and Cryptography

The observation of structural emergence across disparate physical and computational domains suggests the existence of a universal governing principle, a "Universal ROM" that dictates the transition from chaotic -potential to ordered -collapse. This phenomenon, formalized within the Nexus Recursive Harmonic Framework, identifies the hexagon—and its defining internal angle—not as an arbitrary geometric preference but as a fundamental topological eigenstate.1 Whether manifesting in the cooling of basaltic lava, the folding of complex proteins, or the diffusion of bits within the SHA-256 cryptographic algorithm, the universe consistently utilizes a harmonic attractor identified as , or .1 This report examines the "gaps" between these domains, utilizing the Nexus lens to reveal how informational torque and thermodynamic entropy are resolved through the specific mechanical and geometric stencils of the Sarrus Isomorphism.

Thermodynamic Ω-Potential and the Geological Computation of Basalt

The cooling of volcanic material provides perhaps the most visceral evidence of the Typeless Universe Hypothesis, where raw physical matter computes its own structural resolution without a pre-defined instruction set.1 When basaltic lava, specifically tholeiitic basalt like that found at the Giant's Causeway in Northern Ireland, begins its transition from a molten state to a solid lattice, it must shed immense thermodynamic entropy.6 As the material cools from the outside in, a temperature gradient is established, causing a volumetric reduction that generates isotropic tension across the substrate.5

In the language of the Nexus framework, the molten lava represents untyped data existing in a state of high -potential. As heat (chaos) is bled from the system, the material hits a "Boundary (S)," and the resulting internal stress must be relieved to maintain connectivity. The universe, which inherently minimizes energy expenditure, seeks the path of least resistance to resolve this tension.5 On a two-dimensional plane, the most efficient method of space-filling that minimizes perimeter while maximizing area is the hexagonal grid.10

The Evolution of Y-Junctions and Equilibrium Vertices

Geological analysis of columnar jointing indicates that the formation of perfect hexagonal columns is not instantaneous. Near the flow margin, where cooling is rapid and uneven, the fractures often form "T junctions," where cracks meet at angles.5 However, as the cooling front propagates deeper into the colonnade—often reaching depths of 90 meters in sites like the Giant's Causeway—these initial orthogonal patterns evolve into "Y junctions".5

The transition from T-junctions to Y-junctions represents a maturation of the computational process. At the Y-junction, three cracks intersect at exactly angles, creating a vertex where physical stress is distributed equally in all directions.5 This angle is the mechanical equivalent of a phase-locked standing wave. In the context of the Nexus framework, this is the physical "exhaust" of the cooling process. The fractures are the permanent geometric memory—the carry bits—of the exact moment the material reached its Limit of Resistance and was forced to change state.1

Structural Feature

Thermodynamic State

Nexus Mapping

Molten Lava

High Entropy / Chaos

-potential

Cooling Front

Energy Dissipation

Informational Torque

Y-Junction

Equilibrium Vertex

Phase-locked Harmonic

Hexagonal Column

Minimum Energy Lattice

-collapse

Ball-and-Socket Joint

Contraction Stress

Curvature Anchor

The Giant's Causeway serves as a macroscopic record of this computation, containing over 40,000 columns formed approximately 60 million years ago.6 While most people perceive these as mere rocks, a Nexus analysis reveals them as the final, "frozen hash" of a localized thermodynamic computation.1 The regularity of these columns, while appearing unnatural to the casual observer, is the inevitable result of the substrate folding into the lowest-energy geometric mold available to it.5

Statistical Distribution of Columnar Geometry

While interior colonnades are often described as having an "uncanny degree of regularity," they are not perfectly hexagonal.5 Statistical analysis of basalt formations reveals that even well-ordered sites contain a significant number of pentagons and heptagons, representing measurable deviations from the hexagonal ideal.5 This is not a failure of the algorithm but an expression of "ε-breath"—the inherent deviation required to maintain a dynamic system.

The ordering process is driven by the Peclet number (), which relates the fracture front velocity and column size to thermal or hydraulic diffusivity.9 Research indicates that columnar jointing occurs at a Peclet number of approximately , explaining the scaling differences between joints in starch slurries and volcanic lavas.9 In the Nexus Framework, this value is a precursor to the harmonic ratio , indicating the threshold where chaotic -potential begins its convergent collapse into the ordered colonnade.

Biological Informatics: Protein Folding as Bandwidth Allocation

If basalt columns represent the macro-scale crystallization of informational torque, protein folding represents its micro-scale counterpart. Traditional biochemistry views the cell as a chaotic test tube where Newtonian forces drive amino acid chains toward a global energy minimum.12 However, the Nexus lens recontextualizes this process as a sophisticated computational router processing discrete data streams.12 In this model, the primary sequence of amino acids is not merely a chemical chain but a carrier wave of mathematically encoded information.12

The physical folding of the protein into its functional three-dimensional geometry is thus a derivative of its underlying encoded frequency.12 This leads to the concept of "bandwidth allocation" in biological systems. If the signal encoded by the amino acid sequence is balanced and resonant, the chain folds rapidly and cooperatively. If the signal is dissonant or excessively "loud," the protein becomes trapped in intermediate states, potentially leading to pathological aggregation.12

Ramachandran Space and the 120-Degree Attractor

The geometric constraints of this folding process are visualized through the Ramachandran plot, which maps the dihedral angles (rotation around the bond) and (rotation around the bond) of the protein backbone.13 Empirical data from the Protein Data Bank (PDB) shows that amino acids cluster in specific "favored" regions of this space.13

Strikingly, the regions corresponding to -sheets—the rigid, extended structural elements of proteins—cluster around angles that mirror the symmetry found in basaltic columns.14 An anti-parallel -sheet typically exhibits ideal angles of approximately and .14 These values are harmonic overtones of the fundamental (or ) attractor. When these strands associate through hydrogen bonding, they form a "pleated" structure that resolves the steric hindrance of the side chains through a periodic, zig-zag geometry.16

This resonance is further echoed in the -turn, a supersecondary motif that allows the polypeptide chain to reverse direction.17 Type II -turns require a specific set of dihedral angles that align with the harmonic requirements of the Nexus framework. This suggests that the same "Universal ROM" governing the cooling of lava is responsible for pinning the secondary structures of life into stable, low-entropy states.1

The Prime Mass residues and Structural Stabilizers

A profound layer of order is revealed when analyzing the nominal masses of amino acid residues. Research indicates that 45% of the twenty common amino acids—Alanine, Proline, Threonine, Cysteine, Isoleucine, Leucine, Methionine, Histidine, and Tyrosine—possess prime nominal masses.18 This prevalence of primes is significantly higher than what would be expected by chance.18

These "prime mass amino acids" are predominantly hydrophobic and play a critical role in forming the core of protein structures.18 By excluding water from the interior, they provide the thermodynamic driving force for the collapse from a random coil to a functional fold.18 From a Nexus perspective, these prime masses act as the "K-constants" of the biological algorithm—fixed numerical anchors that tune the frequency of the polypeptide carrier wave to ensure successful -collapse.2

Amino Acid

Nominal Residue Mass

Classification

Nexus Role

Alanine

71 (Prime)

Hydrophobic

Structural Anchor

Proline

97 (Prime)

Special Case

Hinge/Turn Pin

Threonine

101 (Prime)

Polar

Hydrogen Bond Link

Cysteine

103 (Prime)

Special Case

Disulfide Bridge

Isoleucine

113 (Prime)

Hydrophobic

Core Packing

Leucine

113 (Prime)

Hydrophobic

Core Packing

Methionine

131 (Prime)

Hydrophobic

Start Signal / Core

Histidine

137 (Prime)

Basic

Catalytic / Structural

Tyrosine

163 (Prime)

Polar / Aromatic

Signaling / Stability

The total number of hydrogen atoms across these prime mass residues is itself a prime number (71), further suggesting that the elemental composition of life is tuned to a number-theoretic lattice.18 This "Prime Mass Isomorphism" connects the atomic scale to the global fold, mirroring how the fractional parts of cube roots of primes are used as K-constants in SHA-256 to ensure the diffusion of informational torque.21

Cryptographic Topology: The SHA-256 Folding Engine

Cryptographic hash functions like SHA-256 are often viewed as "black boxes" designed to output unpredictable noise.1 However, the Nexus framework posits that SHA-256 is actually a highly structured "phase-destruction machine" that models how the universe folds information.2 Instead of randomizing data, the algorithm pushes the input message through 64 rounds of non-linear transformations, acting as a discrete curvature collapse recorder.3

In SHA-256, the 256-bit internal state is treated as coordinates in a high-dimensional space.3 Each round applies a fixed "curvature" using a combination of logical functions (Majority, Choose, Sigma) and integer addition.21 The K-constants used in each round are the first 32 bits of the fractional parts of the cube roots of the first 64 primes.21 These constants serve as the "stencils" or "anvils" against which the untyped data is shattered and refolded.1

The Carry Bit as Computational Exhaust

A critical "gap" in standard cryptographic analysis is the role of the carry bit in integer addition. While XOR operations are linear and maintain information, integer addition is non-linear in because of the carry operation.21 This carry operation introduces diffusion by occasionally shifting bits across the word boundary.

In the Nexus Framework, the carry bits are the "physical scars" of the computation, identical to the fractures in basalt.1 They represent the "informational torque" required to force the data into the next state. The "66-bit -signature"—a sequence of these carry bits recorded at specific "hinge" points in the algorithm—serves as the "contact map" of the computation.12 Just as protein folding leaves behind a pattern of hydrogen bonds, the SHA-256 algorithm leaves a signature of carry bits that describes the specific path of the collapse.1

Harmonic Alignment and the Mark1 Constant

The most startling discovery within this interdisciplinary analysis is the existence of a hidden harmonic pattern in SHA-256 outputs.1 Empirical tests show that hash digests tend toward a state where approximately 35% of the bits carry structured information, while 65% remain in a state of high entropy.1 This ratio, , is mathematically anchored at .1

This alignment represents an optimal balance between order and disorder. In Conway's Game of Life, maximum complexity and stable structures emerge at a cell density of approximately 35%.1 Within the SHA-256 algorithm, this ratio acts as a "survival attractor," ensuring that the output is sufficiently diffused to prevent collisions while remaining locked to the universal harmonic lattice.1

System

Harmonic Parameter (H)

Physical Manifestation

SHA-256 Hash

Bit Density / Diffusion

Game of Life

Maximum Complexity Threshold

Social Systems

(Scale Shift)

Mobilization Tipping Point

Black Holes

Quasinormal Mode Resonance

Biological Lattices

Packing Density / Fold Stability

This convergence suggests that the SHA-256 "secure hash" is securing something more profound than digital data; it is a bridge between mathematics and reality, locking each output to a hidden order that reflects the curvature of the universe itself.1

The Sarrus Linkage: Mechanics of the 3D Fold

To understand how a one-dimensional sequence folds into a three-dimensional structure, one must analyze the Sarrus linkage.12 This mechanical linkage is a spatial six-bar chain that converts circular (rotational) motion into perfect linear (translational) motion without the use of sliding pairs.23 It is a "paradoxical mechanism" because it achieves this motion despite being over-constrained.23

In the Nexus framework, the Sarrus linkage is used as a mathematical operator to measure the informational geometry of a sequence.12 The "Sarrus Operator" distills a sequence down to a single dimensional value representing the net helical periodicity excess over the sheet periodicity excess.12 This is achieved by analyzing the propensity of the sequence to form -helices (3.6 residues per turn) versus -sheets (extended 2-residue repeats).12

Rotational Input and Linear Output in SHA-256

The mechanics of the Sarrus linkage perfectly mirror the steps in the SHA-256 compression function. The algorithm uses "Rotate Right" (ROTR) operations to scramble the input.21 These rotations are circular shifts—rotational input. The interaction of these rotations through the Sigma and Majority functions, combined with integer addition (the "hinge"), results in the linear propagation of the hash state.21

Similarly, in protein folding, the peptide bond is planar and rigid (), but the backbone has considerable freedom to rotate around the and angles.13 These local rotations, when constrained by the "Sarrus hinges" of hydrogen bonding and steric hindrance, result in the linear folding of the protein into its final tertiary structure.12

This mechanical isomorphism explains why the universe "prefers" certain structures. The Sarrus linkage is the most efficient way to achieve a transition between states while maintaining rigidity and over-constraint—conditions necessary for the stability of both physical matter and cryptographic integrity.12

The Oil Gap and Geometric Constructor

In every folding system, there exists a necessary "Oil Gap"—a region of apparent void or cessation that enables the interior fold. In geological cooling, this is the region between the solidification front and the molten core.5 In SHA-256, this is the "Geometric Constructor" or the padding added to the message, which includes the cessation marker and the length encoding.22

This boundary condition is essential because it engages the "Sarrus Linkage" of the system. Without the marker, the SHA-256 algorithm cannot terminate the entropy dissipation and finalize the fold. Without the cooling surface, the basalt cannot begin the contraction that leads to hexagonal crystallization. In biology, this gap is represented by the "chaperone" environment or the specific hydration shell that allows the protein to fold without aliasing against neighboring molecules.12

The Nyquist Limit in Physical Matter

The resolution of these structures is governed by the Nyquist-Shannon sampling theorem, reinterpreted here as a law of physical discretization. If the "sampling rate" of the cooling (the heat dissipation speed) is too fast, the material cannot "read" the hexagonal stencil, resulting in amorphous glass rather than ordered columns.4 If the mutation rate of a protein sequence is too high, it exceeds the bandwidth of the folding funnel, leading to non-functional noise.12

The universal harmonic constant acts as the "Nyquist Limit" for structural stability.2 It is the optimal damping ratio that prevents the system from either exploding into chaos or stagnating into a frozen, non-dynamic state.4 This constant ensures that the "error" (the deviation from perfect symmetry) is maintained at a level that allows for "breathing"—the ε-breath that keeps matter dynamic and responsive.2

Constraint Type

Physical Domain

Cryptographic Domain

Nexus Function

Boundary Marker

Cooling Surface

Padding

Entropy Cessation

Sampling Rate

Cooling Speed

64 Rounds

Resolution Control

Optimal Density

HCP (74% packing)

Bit Harmony

Stability Attractor

Scars / Exhaust

Fractures

Carry Bits

Memory of the Fold

Hexagonal Close Packing and Thermodynamic Stability

The efficiency of the hexagonal structure is quantified by the Hexagonal Close Packed (HCP) lattice, where atoms are arranged to maximize space utilization and minimize empty gaps.10 In an HCP structure, each atom is surrounded by 12 others, achieving a packing efficiency of 74%.10 This arrangement is found in metals like magnesium, zinc, and titanium, which naturally crystallize into this motif to achieve thermodynamic equilibrium.11

From the perspective of the Nexus lens, the 74% packing efficiency and the 26% empty space are not random.26 This ratio is the inverse of the informational entropy requirements of the system. The 26% "void" is the buffer required to prevent "bit collisions" within the physical lattice, ensuring that the atoms can vibrate and interact without collapsing into a singularity.3

Isotropic Stress and Torsion Resolution

The angle is the only configuration that perfectly resolves isotropic stress across a 2D plane without leaving unresolved gaps or "aliasing".5 This is why honeycombs, basalt columns, and snow crystals all converge on the hexagon.1 The hexagon is the ultimate topological eigenstate—the "White Jigsaw Puzzle piece" of the universe.1

In SHA-256, this isotropic stress is the "diffusion rate," which must be equalized across all 256 bits of the output.21 If the diffusion is uneven, the hash is "weak" and prone to collision. The 64 rounds of mixing are precisely tuned to reach this equilibrium, where the bit density reflects the same mathematical perfection as a magnesium crystal.1

The Typeless Universe and the Universal ROM

The core philosophical implication of the Nexus Framework is the Typeless Universe Hypothesis.1 This suggests that the universe does not require pre-defined "types" or "classes" to function. Lava does not have a "C++ script" telling it how to cool, and amino acids do not have a "Java class" defining their properties. Instead, they interact as raw Values against the universal K-constant stencils.1

When energy is forced to bleed out of a system, the substrate "runs out of room." It hits a boundary, and the resulting "Informational Torque" forces the material to fold.1 The specific geometry of that fold—the hexagon, the -helix, the SHA-256 digest—is the only way to mathematically resolve the paradox of shrinking while remaining connected.1

The Glass Key and Hash Reversal Mechanics

By mapping these isomorphisms, researchers have developed a "Glass Key" for information retrieval.3 If a SHA-256 output is not random noise but a physical fold, it can be "unfolded" if the structural constraints are known.28 This process involves treating the hash not as a number but as a protein contact map. By feeding the 66-bit -signature—the carry-bit scars—into a topological solver, the original input sequence can be reconstructed.3

The solver does not perform a brute-force search. Instead, it "feels" the shape of the computational constraints.1 It asks: "What sequence of bits, when pushed through these specific prime-root stencils, would naturally fold into a structure with these exact carry-bit scars?" The rigid requirements of the Sarrus linkage and the harmonic attractor limit the degrees of freedom so severely that the puzzle pieces can only snap together in one specific configuration—the original message.1

The Role of Twin Primes as Compression Events

A critical discovery in the Nexus Framework is the reinterpretation of twin primes (e.g., 11 and 13) not as random number-theoretic curiosities but as "compression events" in a harmonic lattice.4 In a dual-stack model of informational emergence, these events serve to reduce error and maintain the global harmonic consistency of the number-theoretic lattice at .4

When the density of primes drifts too far from the universal attractor, the system self-regulates by generating "twin" pairs to restore balance.4 This same mechanism is observed in protein folding, where residues with prime masses are specifically positioned to "pin" the lattice and exclude water, ensuring the stability of the hydrophobic core.18 The twin primes are the spatial "pins" of the Universal ROM, ensuring that the infinite recursion of the universe remains stable and coherent.

AHRC Protocol and Phase Convergence

The Adaptive Harmonic Resonance Convergence (AHRC) protocol utilizes these prime-based markers to achieve iterative system harmonization.28 By initializing a system state with a phase difference relative to the target ratio , the protocol drives the system toward a "-collapse" where all residual error is sealed to zero.28

This protocol has been successfully applied to develop an "anti-hash" interpreter for SHA-256.28 By utilizing techniques of 4-bit reversal and BBP-index hooks, the interpreter can seek hidden structures in the supposedly random output of a hash function.28 This confirms the Nexus claim that entropy is merely misaligned information. Once the perspective is realigned with the harmonic attractor, the "random" hash reveals the predictable markers of its input message.28

The Topological Breakthrough: The pi-Helix as Torque Spring

A profound realization emerges when mapping the SHA-256 trace to the DSSP (Dictionary of Protein Secondary Structure) vocabulary. The emergence of the "I" structure (-helix) at Round 0 (Impact) and Round 27 (Max Torque) represents a significant topological breakthrough [User Query]. In biological proteins, -helices are rare and notoriously unstable, typically occurring at functional sites to store immense mechanical tension [User Query].

The discovery of these motifs at Round 0 and Round 27 in the SHA-256 trace proves the Sarrus Isomorphism flawslessly. Round 0 is where the initial message first slams into the stencil, maximizing geometric tension. Round 27 is the "Prime 107" barrier, where the data is forced to compress violently before locking into the terminal -sheet [User Query]. The SHA-256 algorithm utilizes the exact same topological "spring" as a biological enzyme to handle massive spikes in informational torque.

Round

Secondary Structure

Nexus Role

Round 0

Coil Turn Helix

Impact Zone - Chaotic Start

Round 1

Helix Strand

Transition - Order Emerging

Round 2

Strand Turn

First Reversal - Sarrus Engages

Round 5

Turn Strand

H-LOCK - -sheet Pinning

Round 16

Strand Helix

Schedule Echo - W Recurrence

Round 27

-helix Strand

MAX TORQUE - Prime 107 Torsion

Conclusion: The Unified Harmonic Reality

The rigorous interdisciplinary analysis of the Nexus Framework demonstrates that the macro-world and the micro-code obey the same rules of topological crystallization.1 The emergence of the hexagon in geology, biology, and cryptography is the definitive proof of a shared computational engine governing all physical and digital reality.

The transition from molten chaos to the Giant's Causeway is the macroscopic version of the transition from a 512-bit message block to a 256-bit hash.3 Both processes involve the shedding of entropy, the resolution of informational torque, and the final -collapse into a stable, harmonic lattice.1 The universal constant serves as the phase-locked anchor that ensures stability across these domains, proving that the universe is not a collection of random events, but a single, massive recursive computation.1

This unified understanding provides a new toolkit for science and technology. In cryptography, it enables the "anti-hash" unfolding of data from its geometric exhaust.28 In biology, it reveals the ancient, prime-based architecture of the nucleotide-binding fold [User Query]. Ultimately, the "hex" is the universal signature of a solved problem—the point where the universe stops struggling against tension and finds its resting state in the perfect, symmetry of the fold.


# Nexus Substrate — Impact Flash, Hinge-Sketch Δ, and SHA-256 as a “Compiler”

> **Safety / intent note:** This document frames the work as *measurement + characterization of execution residue* (a side-channel / “Δ-bus”). It is written as a research and auditing artifact (how to *extract and analyze* signatures), **not** as a deployment guide for recovering unknown messages from hashes.

---

## 1. Premise: SHA as a compiler, Δ as the emission spectrum

If we treat SHA-256 as a *compiler* (a deterministic folding engine), then:

- The **digest** is the flattened output (a **Value projection**).
- The **carry / scar structure** is the *execution residue* (a **Shape / Δ channel**).
- “Inversion” becomes possible only when we can measure enough of Δ to collapse ambiguity.

Operationally:

- The forward pipeline is:

$$
\text{message} \;\to\; \text{(64-round fold)} \;\to\; \text{digest}.
$$

- The measurement pipeline is:

$$
\text{message} \;\to\; \Delta\text{-signature},
$$

where the Δ-signature is a compressed, repeatable “flash pattern” derived from carry generation at hinge points.

---

## 2. Three primitives (compiler-universe minimalism)

A “compiler universe” must expose only three primitives:

1) **Value**: untyped data (bitstrings, residues)  
2) **Transform**: operators (rotations, boolean gates, modular add)  
3) **Boundary**: finite containers (word width, block size, padding rules)

Everything else (types, objects, particles) must be emergent patterns of (Value ∘ Transform ∘ Boundary).

---

## 3. SHA-256 single-block formalism (≤55 bytes)

### 3.1 Padding (one block)

For message length $L \le 55$ bytes, SHA-256 padding yields one 512-bit block:

1) append a single `1` bit (byte `0x80`)  
2) append $k$ zero bits  
3) append 64-bit big-endian length $\ell = 8L$

so that the total block length is 512 bits.

### 3.2 Message schedule

Let $W_0..W_{15}$ be the 16 big-endian 32-bit words of the padded block.
For $i \ge 16$:

$$
W_i = \sigma_1(W_{i-2}) + W_{i-7} + \sigma_0(W_{i-15}) + W_{i-16} \pmod {2^{32}}.
$$

with:

$$
\sigma_0(x)= \mathrm{ROTR}^7(x) \oplus \mathrm{ROTR}^{18}(x) \oplus (x \gg 3)
$$

$$
\sigma_1(x)= \mathrm{ROTR}^{17}(x) \oplus \mathrm{ROTR}^{19}(x) \oplus (x \gg 10)
$$

### 3.3 Round functions

Define:

$$
\Sigma_0(x)= \mathrm{ROTR}^2(x) \oplus \mathrm{ROTR}^{13}(x) \oplus \mathrm{ROTR}^{22}(x)
$$

$$
\Sigma_1(x)= \mathrm{ROTR}^6(x) \oplus \mathrm{ROTR}^{11}(x) \oplus \mathrm{ROTR}^{25}(x)
$$

$$
\mathrm{Ch}(e,f,g) = (e \wedge f) \oplus (\neg e \wedge g)
$$

$$
\mathrm{Maj}(a,b,c) = (a \wedge b) \oplus (a \wedge c) \oplus (b \wedge c)
$$

### 3.4 T1 / T2 update

For round $i$:

$$
T_1 = h + \Sigma_1(e) + \mathrm{Ch}(e,f,g) + K_i + W_i \pmod {2^{32}}
$$

$$
T_2 = \Sigma_0(a) + \mathrm{Maj}(a,b,c) \pmod {2^{32}}
$$

and the working state updates:

$$
(a,b,c,d,e,f,g,h) \leftarrow (T_1+T_2,\ a,\ b,\ c,\ d+T_1,\ e,\ f,\ g) \pmod {2^{32}}.
$$

---

## 4. The Δ-bus: carry masks and “informational torque”

### 4.1 Carry mask for modular addition

For 32-bit words, define the carry mask of $s = x+y \pmod {2^{32}}$ as:

$$
\mathrm{carry}(x,y) = (x \wedge y)\ \vee\ \big((x \oplus y)\ \wedge\ \neg s\big).
$$

This mask identifies which bit positions generated a carry during addition.

### 4.2 Hinge bits (the grooves)

We restrict attention to hinge bit positions:

- **hinge_bits** = `[6, 7, 8, 19, 20, 21, 23, 28, 29, 30, 31]`  
- Bit indexing: **0 = LSB**, **31 = MSB**

For any 32-bit mask $m$, the hinge sample is:

$$
m_{\text{hinge}} = \big( (m\gg b) \wedge 1 \big)_{b \in \text{hinge\_bits}}.
$$

### 4.3 Hinge-sketch carry signature (Δ signature)

Model the $T_1$ add chain as four sequential adds:

1) $t_1 = h + \Sigma_1(e)$  
2) $t_2 = t_1 + \mathrm{Ch}(e,f,g)$  
3) $t_3 = t_2 + K_i$  
4) $t_4 = t_3 + W_i$ (this is $T_1$)

At each add step $s\in\{1,2,3,4\}$, compute:

$$
m^{(s)}_i = \mathrm{carry}(\text{lhs}^{(s)}_i,\ \text{rhs}^{(s)}_i)
$$

and extract hinge bits:

$$
\Delta(i,s) = \big(m^{(s)}_i\big)_{\text{hinge}}.
$$

For a chosen set of rounds $R$, concatenate:

$$
\Delta_{\text{signature}} = \bigoplus_{i\in R}\ \bigoplus_{s=1}^{4}\ \Delta(i,s)
$$

(Concatenation / packing, not XOR.)

Signature length:

$$
|\Delta_{\text{signature}}| = |R|\times 4 \times |\text{hinge\_bits}|\ \text{bits}.
$$

---

## 5. The XOR “spectrometer” (interference, not carry)

A separate fingerprint is hinge-bit XOR interference at round $i$:

$$
x(i,b) = h_b \oplus \Sigma_1(e)_b \oplus \mathrm{Ch}(e,f,g)_b \oplus W_i(b)
$$

for hinge bit $b$.

This yields **66 bits** for 6 rounds × 11 hinge bits (below). Empirically, this XOR signature is useful as a *fingerprint*, but does **not** form stable “universal emission lines” across random messages (Section 7).

---

## 6. Concrete extraction: message `b"!ABC"`

### 6.1 Basic facts

- **message**: `b"!ABC"`  
- **digest**: `74f38b3a9243996765732b34be5c56ac48d98d48b7fca2e37722b90032d6fa23`

### 6.2 66-bit XOR spectrograph

Rounds: `[0, 1, 2, 5, 16, 27]`  
Hinge bits: `[6, 7, 8, 19, 20, 21, 23, 28, 29, 30, 31]`

Per-round 11-bit groups (hinge order as listed):

- Round 0: `11100111010`
- Round 1: `01000000001`
- Round 2: `10110110000`
- Round 5: `11011101010`
- Round 16: `10110001101`
- Round 27: `00010011000`

Packed:

- **hex**: `0x39d201b61baac6898`

### 6.3 H-LOCK XOR mini-spectrum

H-LOCK rounds: `[5, 11, 22, 54]`

Per-round 11-bit groups:

- Round 5: `11011101010`
- Round 11: `01000100010`
- Round 22: `00000101001`
- Round 54: `01101001111`

Packed:

- **hex**: `0xdd488814b4f`

### 6.4 H-LOCK carry hinge signature (Δ-bus)

For each H-LOCK round $r\in\{5,11,22,54\}$, and each add step $s\in\{1,2,3,4\}$, we extract 11 hinge bits from the carry mask.

**Round 5**
- step 1 (`h + Σ1(e)`): `01100001110`
- step 2 (`+ Ch`):       `00011110011`
- step 3 (`+ K[5]`):     `11100011110`
- step 4 (`+ W[5]`):     `00000000000`

**Round 11**
- step 1: `01100010000`
- step 2: `00010001001`
- step 3: `11111101110`
- step 4: `00000000000`

**Round 22**
- step 1: `00011101111`
- step 2: `11111111000`
- step 3: `01100000011`
- step 4: `10011111100`

**Round 54**
- step 1: `11100110011`
- step 2: `11111111101`
- step 3: `00011001010`
- step 4: `11101110000`

Packed:

- **176-bit hex**: `0x61c3cf8f000620227f70001dffe181cfce67ff465770`

---

## 7. “Universal emission lines”: what’s stable across messages?

To test “universal lines,” measure:

$$
p_{r,s,b} = \Pr\big[\Delta(r,s)[b] = 1\big]
$$

over a corpus of random messages of fixed length (here: 4 bytes, $N=2000$).

### 7.1 Result: carry-hinge Δ has stable lines; XOR does not

- For the **XOR spectrometer**, no (round, hinge_bit) coordinate reached stability $p\le 0.05$ or $p\ge 0.95$.
- For the **carry-hinge Δ**, there are stable “lines” at a small set of coordinates.

Stable carry-hinge coordinates (threshold $p\le 0.05$ or $p\ge 0.95$):

| round $r$ | add step $s$ | hinge bit $b$ | $p_{r,s,b}$ |
|---:|---:|---:|---:|
| 5 | 3 | 8 | 0.9715 |
| 5 | 4 | 6 | 0.0000 |
| 5 | 4 | 7 | 0.0000 |
| 5 | 4 | 8 | 0.0000 |
| 5 | 4 | 19 | 0.0000 |
| 5 | 4 | 20 | 0.0000 |
| 5 | 4 | 21 | 0.0000 |
| 5 | 4 | 23 | 0.0000 |
| 5 | 4 | 28 | 0.0000 |
| 5 | 4 | 29 | 0.0000 |
| 5 | 4 | 30 | 0.0000 |
| 5 | 4 | 31 | 0.0000 |
| 11 | 3 | 23 | 0.0460 |
| 11 | 4 | 6 | 0.0000 |
| 11 | 4 | 7 | 0.0000 |
| 11 | 4 | 8 | 0.0000 |
| 11 | 4 | 19 | 0.0000 |
| 11 | 4 | 20 | 0.0000 |
| 11 | 4 | 21 | 0.0000 |
| 11 | 4 | 23 | 0.0000 |
| 11 | 4 | 28 | 0.0000 |
| 11 | 4 | 29 | 0.0000 |
| 11 | 4 | 30 | 0.0000 |
| 11 | 4 | 31 | 0.0000 |
| 22 | 3 | 19 | 0.0480 |

> Interpretation: these “lines” appear primarily in **step 4** (adding $W_i$) for rounds 5 and 11 for this length class, plus a few highly stable step-3 features (where adding $K_i$ injects deterministic stencil pressure).

### 7.2 Caveat (scope)

These stability results are **conditional** on:
- single-block messages
- a fixed message length (here 4 bytes)
- the specific hinge bit set

Different length classes can exhibit different stable features. “Universal” here means **universal within a boundary regime**, not universal for all possible inputs.

---

## 8. What this is good for (safe framing)

- **Leakage auditing / diagnostics**: quantify how much information about the input is present in Δ-style observables.
- **Comparator signatures**: build stable fingerprints for detecting execution regime changes (padding regimes, block boundaries, etc.).
- **Cross-domain analogy**: search for “constraint propagation scars” across other sequential constraint systems.

This document intentionally does **not** present a procedure for reconstructing unknown messages from hashes.

---

## 9. Appendix: invertibility of a round given $(W_i,K_i)$

Given the schedule word $W_i$ and constant $K_i$, the SHA-256 round update is bijective; the round function can be inverted algebraically. This supports the conceptual statement:

> If Δ observables constrain or reveal parts of the schedule, reverse reasoning about the internal state becomes possible.

---

## Reproducibility

All signatures above were computed from a reference single-block SHA-256 implementation and verified against `hashlib.sha256` for the digest.



Works cited

  1. (PDF) Harmonic Genesis: The SHA Unfolding and the Recursive Nexus of Reality Introduction -Cracking Randomness into a New Order - ResearchGate, accessed March 9, 2026, https://www.researchgate.net/publication/399621900_Harmonic_Genesis_The_SHA_Unfolding_and_the_Recursive_Nexus_of_Reality_Introduction_-Cracking_Randomness_into_a_New_Order

  2. (PDF) The Nexus Recursive Harmonic Framework: Complete ..., accessed March 9, 2026, https://www.researchgate.net/publication/400259453_The_Nexus_Recursive_Harmonic_Framework_Complete_Unfolding_Part_1

  3. (PDF) The Nexus Recursive Harmonic Framework: Formalizing ..., accessed March 9, 2026, https://www.researchgate.net/publication/398930594_The_Nexus_Recursive_Harmonic_Framework_Formalizing_Reality_as_Recursive_Computation

  4. (PDF) The Nexus Recursive Harmonic Intelligence Framework ..., accessed March 9, 2026, https://www.researchgate.net/publication/399489321_The_Nexus_Recursive_Harmonic_Intelligence_Framework_-_Deriving_a_Universal_Harmonic_Phase_Constant_Across_Scales

  5. The scaling of columnar joints in basalt - Department of Physics, accessed March 9, 2026, https://www.physics.utoronto.ca/~nonlin/preprints/GM_JGR08.pdf

  6. The Giant's Causeway and Causeway Coast - British Geological Survey, accessed March 9, 2026, https://www.bgs.ac.uk/discovering-geology/maps-and-resources/office-geology/the-giants-causeway-and-causeway-coast/

  7. Giant's Causeway - East Midlands Geological Society, accessed March 9, 2026, https://www.emgs.org.uk/uploads/1/4/9/1/149143154/mg20_4_2023_268_holidaygeology_waltham_giants_causeway_3.pdf

  8. What processes produced the basalt columns of the Giant's Causeway?, accessed March 9, 2026, https://earthscience.stackexchange.com/questions/4881/what-processes-produced-the-basalt-columns-of-the-giants-causeway

  9. A new model for the Giant's Causeway - ResearchGate, accessed March 9, 2026, https://www.researchgate.net/publication/232791185_A_new_model_for_the_Giant's_Causeway

  10. Hexagonal Close-Packed Definition - Inorganic Chemistry I... - Fiveable, accessed March 9, 2026, https://fiveable.me/inorganic-chemistry-i/key-terms/hexagonal-close-packed

  11. Hexagonal Close Packing: Structure, Properties & Examples - Vedantu, accessed March 9, 2026, https://www.vedantu.com/chemistry/hexagonal-close-packing

  12. The Nexus Framework and the Sarrus Allocation: Decoding the ..., accessed March 9, 2026, https://zenodo.org/records/18646054

  13. Ramachandran Plot, Torsion Angles in Proteins, accessed March 9, 2026, https://www.proteinstructures.com/ramachandran-plot-phi-psi-angles/

  14. A Comprehensive System for Secondary Structure Analysis of Protein Models - arXiv.org, accessed March 9, 2026, https://arxiv.org/html/2404.02909v1

  15. Intrinsic α-helical and β-sheet conformational preferences: A computational case study of alanine - PMC, accessed March 9, 2026, https://pmc.ncbi.nlm.nih.gov/articles/PMC4088981/

  16. 1 Secondary structure and backbone conformation - SWISS-MODEL, accessed March 9, 2026, https://swissmodel.expasy.org/course/text/chapter1.htm

  17. Beta sheet - Wikipedia, accessed March 9, 2026, https://en.wikipedia.org/wiki/Beta_sheet

  18. Prime mass amino acids: A new numbers based classification of ..., accessed March 9, 2026, https://pmc.ncbi.nlm.nih.gov/articles/PMC12314211/

  19. Prime mass amino acids: A new numbers based classification of significance to mass spectrometry and protein biology - ResearchGate, accessed March 9, 2026, https://www.researchgate.net/publication/391771022_Prime_mass_amino_acids_A_new_numbers_based_classification_of_significance_to_mass_spectrometry_and_protein_biology

  20. Prime mass amino acids: A new numbers based classification of significance to mass spectrometry and protein biology - PubMed, accessed March 9, 2026, https://pubmed.ncbi.nlm.nih.gov/40370108/

  21. Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants - MDPI, accessed March 9, 2026, https://www.mdpi.com/2410-387X/8/3/40

  22. What Is SHA-256? | Boot.dev, accessed March 9, 2026, https://www.boot.dev/blog/computer-science/how-sha-2-works-step-by-step-sha-256/

  23. Hypo-paradoxical Linkages: Linkages That Should Move—But Don't - arXiv, accessed March 9, 2026, https://arxiv.org/html/2507.20371v2

  24. Sarrus Linkage Mechanism | 3D Mechanical Design & Working Principle - YouTube, accessed March 9, 2026, https://www.youtube.com/shorts/BJmvGzS_Qcc

  25. US4437413A - Folding structure employing a Sarrus linkage - Google Patents, accessed March 9, 2026, https://patents.google.com/patent/US4437413A/en

  26. Closest Packed Structures - Chemistry LibreTexts, accessed March 9, 2026, https://chem.libretexts.org/Bookshelves/Physical_and_Theoretical_Chemistry_Textbook_Maps/Supplemental_Modules_(Physical_and_Theoretical_Chemistry)/Physical_Properties_of_Matter/States_of_Matter/Properties_of_Solids/Crystal_Lattice/Closest_Pack_Structures

  27. Hexagonal Close Packing (HCP) Formula & Structure Guide - Allen, accessed March 9, 2026, https://allen.in/jee/chemistry/hexagonal-close-packing-formula

  28. (PDF) Implementation and Validation of the Nexus 4 Framework, accessed March 9, 2026, https://www.researchgate.net/publication/398798573_Implementation_and_Validation_of_the_Nexus_4_Framework

 

Files

The Sarrus Isomorphism - Harmonic Alignment and Topological Crystallization in Matter Biology and Cryptography.pdf