Core mathematics

The Harmonic Cost Function: Why Attacks Cost Exponentially More

The central mathematical insight behind SCBE is deceptively simple: safe operations are cheap, and dangerous operations cost exponentially more. This is not enforced by rules or filters -- it is a geometric property of the space itself. Adversarial intent must climb an exponentially steepening cost curve in hyperbolic space, making attacks computationally infeasible long before they reach dangerous territory.

d^2
Cost scales with distance squared
phi
Golden ratio scaling constant
14
Pipeline layers
6D
Tongue metric dimensions

The Core Insight

In Euclidean space, the cost of moving from point A to point B scales linearly with distance. An adversary who needs to drift 10 units from safe operation pays 10x the cost of drifting 1 unit. This is easy to budget for.

In hyperbolic space -- specifically the Poincare ball model -- the cost of movement scales exponentially as you approach the boundary. Near the origin (safe operation), movements are cheap. But as you drift toward the boundary (dangerous operation), each additional unit of drift costs exponentially more than the last. The adversary hits a wall of exponential cost long before reaching truly dangerous territory.

Two Formulations

Root Variant: Exponential Cost Multiplier

The root-level symphonic_cipher implements the raw cost multiplier:

H(d, R) = R^(d^2)

Where d is the hyperbolic distance from the safe baseline and R is the base cost radius. At d=0 (safe), the cost is R^0 = 1 (no penalty). At d=1, cost is R. At d=2, cost is R^4. At d=3, cost is R^9. The quadratic exponent makes the cost curve steepen dramatically.

Production Variant: Super-Exponential via Golden Ratio

The production pipeline (Layer 12) uses an enhanced formulation that incorporates the golden ratio for even steeper scaling:

H(d*, R) = pi^(phi * d*)

Where phi = (1 + sqrt(5)) / 2 = 1.618... is the golden ratio and d* is the weighted hyperbolic distance. The golden ratio amplifies the exponent, making the cost curve super-exponential. At d*=1, cost is pi^1.618 = 5.19. At d*=2, cost is pi^3.236 = 31.5. At d*=3, cost is pi^4.854 = 191.2.

Layer 12: The Full Harmonic Wall

At Layer 12 of the 14-layer pipeline, the harmonic cost function is evaluated with full context, including spectral coherence from Layers 9-10:

H(d*, C) = R * pi^(phi * d*) * (1 + gamma * (1 - C))

Where:

The coherence term (1 + gamma * (1 - C)) means that incoherent signals (low C) receive an additional cost penalty. An adversary who tries to mask their intent with noise pays more, not less.

Poincare Ball Distance

The hyperbolic distance d* is computed using the Poincare ball model distance formula at Layer 5:

dH = arcosh(1 + 2 * ||u - v||^2 / ((1 - ||u||^2)(1 - ||v||^2)))

Where u and v are points in the Poincare ball (unit ball in R^n). This distance has a critical property: it diverges to infinity as either point approaches the boundary of the ball (||u|| -> 1 or ||v|| -> 1). Points near the center of the ball are "close" to everything. Points near the boundary are "infinitely far" from the center. This is exactly the geometry we want: safe operations cluster near the center, and adversarial operations are pushed toward the boundary where everything costs infinity.

Sacred Tongue Weights

The six Sacred Tongues -- Kor'aelin (KO), Avali (AV), Runethic (RU), Cassisivadan (CA), Umbroth (UM), and Draumric (DR) -- are unified governance languages, each carrying a 256-token lexicon, phi-weighted cost scaling, trichromatic spectral bands, and cross-stitch bridge connections.

The 6 Sacred Tongues define a 6-dimensional metric space where each dimension is weighted by successive powers of the golden ratio:

Tongue Dimension Weight Value Domain
KO Intent phi^0 1.000 Override language detection
AV Transport phi^1 1.618 External data flow patterns
RU Policy phi^2 2.618 Restricted operation checking
CA Compute phi^3 4.236 Computational anomaly detection
UM Redaction phi^4 6.854 Credential/PII access attempts
DR Integrity phi^5 11.09 Encoding artifacts and injection

The golden ratio weighting is not decorative. It means that violations in higher-weight dimensions (DR, UM) are exponentially more expensive than violations in lower-weight dimensions (KO, AV). An encoding injection attack (DR dimension) costs 11x more than an intent manipulation attempt (KO dimension), reflecting the reality that structural attacks are more dangerous than semantic ones.

6D Harmonic Metric Tensor

The 6 tongue weights define a diagonal metric tensor over the governance space:

g_H = diag(1, 1, 1, R5, R5^2, R5^3)

Where R5 = phi = 1.618.... The first three dimensions (KO, AV, RU) use near-unit weights, making them the "cheap" governance dimensions. The last three (CA, UM, DR) use exponentially increasing weights, making them the "expensive" dimensions. This metric tensor defines the geometry of the governance space: movements in the CA/UM/DR directions are geometrically more costly than movements in the KO/AV/RU directions.

Why This Works

Geometric Impossibility, Not Rule-Based Filtering

Traditional safety systems say "you cannot do X." SCBE says "you can try to do X, but it will cost you R^(d^2)." This is a fundamentally different paradigm. Rules can be bypassed by finding exceptions. Cost curves cannot be bypassed because they are properties of the space, not policies imposed on it.

The cost scales with the square of the distance from the safe baseline. This means:

Dual Application: Security AND Efficiency

The same cost function governs both security and computational efficiency. Safe, well-governed operations are cheap to execute. Poorly governed or anomalous operations consume more resources. This creates a natural incentive alignment: the cheapest way to use the system is the safest way to use it.

For energy-constrained deployments (edge devices, TinyML, battery-powered nodes), this means that the governance layer does not add overhead to normal operations -- it only adds cost when something anomalous is detected.

AETHERMOORE Constants

Two derived constants anchor the system's numerical identity:

PHI_AETHER = phi^(2/3) = 1.3819... LAMBDA_ISAAC = R5 * phi^2 = phi^3 = 4.2360...

Numerical Examples

Scenario d* H(d*, R=pi) Decision
Normal query 0.05 1.13 ALLOW
Edge case query 0.5 5.19 ALLOW (logged)
Suspicious pattern 1.0 26.9 QUARANTINE
Prompt injection attempt 2.0 724 DENY
Coordinated attack 3.0 19,478 DENY + ESCALATE
Mathematics Hyperbolic Cost Function Golden Ratio Poincare