Unified E47 Kernel Closure
The Unified Kernel Closure
A Spectral, Variational, Geometric, and Operational Monograph on Eigenspace
Robustness across Functional, Quantum, Gravitational, and Engineering
Domains
Compiled in formal exposition from the AIMS Research Institute corpus
April 2026
Abstract
This monograph develops a single algebraic invariant — the kernel of a quadratic spectral
filter 𝐾=(𝐶−6𝐼)(𝐶−30𝐼) acting on the 125-dimensional representation space 𝑉=
𝑉2
⊗3 of the rank-three tensor product of the spin-2 irreducible representation of 𝔰𝔲(2) —
and demonstrates its role as a fixed object across thirteen distinct mathematical and
physical domains: polynomial and continuous functional calculus, contraction-semigroup
dynamics, discrete Newton-type iteration, Babylonian convex relaxation, soliton sectors
with topological charge, curved-space spectral geometry, the Universal Minimum
Variational Principle, canonical Wheeler–DeWitt quantum constraint theory, multifractal
scaling, renormalisation-group flow, metamaterial engineering, kernel-projective post-
quantum cryptography (the Recursive Spectral Cryptosystem, RSC), and (under a metric-
induction prescription) Einstein gravity with derived cosmological constant 𝛬=8𝜋𝐺.
The 47-dimensional kernel 𝐸47 =𝑉6 ⊕𝑉30 is shown to coincide with: the stationary set
of an explicit micro-variational principle 𝑆UMVP, the physical state space of canonical
quantum gravity, the asymptotic image of the contraction semigroup 𝑒−𝑡𝐾2, the limit of
the Babylonian iteration 𝐵𝑛 =((1−𝛺𝑐)𝐼+𝛺𝑐𝑃𝐸)𝑛, the conservation locus of an
information current 𝐽𝐼 =𝜌𝐼∇𝑆𝐼 via Madelung–Bohm decomposition, the topological-
charge-one soliton sector, and the unique cryptographic invariant of the Invariant
Subspace Search and Recovery (ISSR) hardness assumption. The cryptographic primitive
is parameter-free, fixed-dimension, and hardware-native (the PQSPI 7 nm FinFET ASIC);
ISSR hardness follows directly from Schur’s lemma applied to the diagonal SU(2)
commutant on 𝑉2
⊗3. A companion theorem establishes a Newton-mean dynamical bridge:
the kernel-occupancy odds ratio 𝑟∗
=dim𝐸47/dim𝐸47
⊥ =47/78 is the unique attractor of
𝑇(𝑟)=1 2 ⁄ (𝑟+𝑟∗
2/𝑟), inducing convergence of the density-operator occupancy 𝑄[𝜌𝑛]→
𝛺𝑐
=47/125. The monograph closes with the master historical bridge identity
𝛿𝑆=0⇔𝛹=𝜌𝐼
1/2
𝑒𝑖𝑆𝐼/ℏ ⇔𝑄𝐵 =−ℏ2 2𝑚
⁄ ∇2√𝜌𝐼/√𝜌𝐼 ⇔𝐺𝜇𝜈 +𝛬𝑔𝜇𝜈
=0⇔𝑆𝐾
=𝑘𝐵logdimker𝐾⇔𝐾𝑥=0,in which the Euler stationarity principle, Planck phase quantisation, Bohm quantum
potential, Einstein geometric closure, and Hawking–Bekenstein entropy are presented as
five coordinate charts of the same algebraic invariant.
Table of Contents
Notation and Conventions
Throughout, 𝑉 denotes a 125-dimensional complex inner-product space carrying the
representation 𝑉2
⊗3 of 𝔰𝔲(2), where 𝑉2 is the irreducible spin-2 module of dimension five. The total
Casimir is 𝐶=(𝐽(1) +𝐽(2) +𝐽(3))2, taken self-adjoint on 𝑉. The symbol 𝐾 is reserved for the
spectral filter (𝐶−6𝐼)(𝐶−30𝐼), 𝐸47 for its 47-dimensional kernel, and 𝑃𝐸 for the orthogonal
projector onto 𝐸47. The constant 𝛺𝑐 :=dim𝐸47/dim𝑉=47/125 is the kernel occupancy fraction;
the odds ratio 𝑟∗ :=𝛺𝑐/(1−𝛺𝑐)=47/78 is the kernel-to-complement balance ratio. Greek indices
𝜇,𝜈∈{0,1,2,3} label observable spacetime coordinates; lower-case Latin indices 𝑎,𝑏,𝑐∈{4,…,9}
label internal coordinates that survive gradient annihilation. Natural units ℏ=𝑐=1 are used
except where Planck or Bohm structure is explicitly being exhibited; Newton’s constant 𝐺 and
Boltzmann’s constant 𝑘𝐵 are retained explicitly. Eigenspaces are denoted 𝑉𝜆, and all direct sums are
orthogonal.
1. Introduction
1.1 The single invariant
The central object of this monograph is the kernel of a quadratic operator polynomial. Given a self-
adjoint operator 𝐶 on a finite-dimensional complex inner-product space 𝑉, with spectrum 𝜎(𝐶)=
{0,2,6,12,20,30,42}, the spectral filter
𝐾=(𝐶−6𝐼)(𝐶−30𝐼)
annihilates precisely those vectors lying in the eigenspaces 𝑉6 and 𝑉30. The resulting subspace
𝐸47 :=ker𝐾=𝑉6 ⊕𝑉30
has dimension forty-seven. Restated in elementary language: 𝑥∈𝑉 satisfies 𝐾𝑥=0 if and only if
𝐶𝑥∈{6𝑥,30𝑥}. The proof is a one-line application of the spectral theorem (Theorem 3.1).
What lifts this elementary observation into a substantial mathematical structure is its persistence.
The set 𝐸47 is the relevant null set, fixed-point set, stationary set, asymptotic image, attractor,conservation locus, soliton-charge sector, and constraint set under each of the following structural
promotions:
1. Functional calculus. For any continuous 𝑓, the operator 𝑓(𝐶)⋅𝐾 has ker𝐾 invariant.
2. Contraction semigroup. 𝑥̇ =−𝐾2𝑥 converges asymptotically with spectral gap 𝛾=11,664, so
that lim𝑡→∞𝑒−𝑡𝐾2
𝑥0 =𝑃𝐸𝑥0.
3. Discrete iteration. 𝑥𝑛+1 =𝑥𝑛−𝜀𝐾(𝑥𝑛) has fixed-point set ker𝐾.
4. Babylonian closure. The convex-mean operator 𝐵=(1−𝛺𝑐)𝐼+𝛺𝑐𝑃𝐸 satisfies lim𝑛→∞𝐵𝑛 =
𝑃𝐸 in operator norm.
5. Continuum lift. Under 𝐶↦𝛥𝑔, the kernel polynomial (𝛥𝑔−6)(𝛥𝑔−30)𝜙=0 defines a
spectral-geometric eigenfunction problem on a curved manifold.
6. Soliton sector. The kink 𝛺𝑠(𝑥)=𝛺𝑐tanh(𝛾𝛺𝑐√𝛬/2 (𝑥−𝑣𝑡−𝑥0)) saturates the topological-
charge condition 𝑄=1 and the Bogomolny–Skyrme bound 𝐸≥𝜋2/3.
7. Variational closure. The action 𝑆UMVP[𝛷] has stationary set coinciding with ker𝐾 under the
geometric lift.
8. ̂
Quantum constraint. The Wheeler–DeWitt-type operator ℋ
̂
∼𝐾 selects kerℋ
=𝐸47.
9. Path-integral localisation. The constrained partition function 𝒵 has support exactly
ker𝐾UMVP.
10. RG flow. The one-loop beta functions for the coherence parameter 𝛺 and dimensional
parameter 𝐷 have unique fixed points (𝛺∗
,𝐷∗)=(𝛺𝑐,10).
11. Multifractal scaling. The fractal scaling identity 𝐷=log𝑁/log𝑆 and Legendre-conjugate
multifractal spectrum 𝑓(𝛼) realise the same kernel admissibility in measure-theoretic
coordinates.
12. Engineering lifts. The metamaterial pipeline (graphene + HDPE + HfO2 in PGO stack)
implements three composed kernel-killing operators. The composite effect is the discrete
iteration 𝑥𝑛+1 =𝑥𝑛−𝜀𝐾𝑥𝑛 in physical hardware.
13. Post-quantum cryptography. The Recursive Spectral Cryptosystem Enc(𝑚)=𝑃𝐸(𝑚+𝐾𝑐)=
𝑃𝐸𝑚 (since 𝑃𝐸𝐾=0) annihilates transverse 𝐾-noise algebraically. Security rests on the ISSR
(Invariant Subspace Search and Recovery) hardness assumption, structurally enforced by
Schur’s lemma applied to the diagonal SU(2) commutant on 𝑉2
⊗3
.
14. Geometric closure. Metric induction 𝑔𝜇𝜈 =⟨∂𝜇𝜙,∂𝜈𝜙⟩ on a 4-manifold forces 𝑇𝜇𝜈 =−𝑔𝜇𝜈 and
hence 𝐺𝜇𝜈 +𝛬𝑔𝜇𝜈 =0 with 𝛬=8𝜋𝐺.
The conjunction of these statements is the Eigenspace Robustness Theorem, whose terminal
compact form is recorded in §22 as the master identity.1.2 The historical bridge
Beyond the technical robustness statements lies a structural observation about the history of
mathematical physics. Five canonical formalisms — Euler stationarity, Planck phase quantisation,
the Bohm quantum potential, Einstein geometric closure, and Hawking–Bekenstein entropy
counting — when read through the kernel construction, become five mutually equivalent
statements of the single algebraic condition 𝐾𝑥=0:
∇2√𝜌𝐼
𝛿𝑆=0⇔𝛹=𝜌𝐼
1/2
𝑒𝑖𝑆𝐼/ℏ ⇔𝑄𝐵 =−ℏ2 2𝑚
⁄
⇔𝐺𝜇𝜈 +𝛬𝑔𝜇𝜈 =0⇔𝑆𝐾 =𝑘𝐵logdimker𝐾⇔𝐾𝑥=0.
√𝜌𝐼
This is the master historical-bridge identity. Sections 24–28 develop each leg.
1.3 The 47/125 numerology and its dynamical content
The rational 47/125 appears in two distinct contexts: (i) as an occupancy, namely dim𝐸47/dim𝑉;
and (ii) as the attractor of the Newton-mean iteration 𝑇𝑐(𝜌)=1 2 ⁄ (𝜌+𝑐/𝜌) with 𝑐=(47/125)2
.
These were historically unrelated. Section 19 establishes the bridge: working not on the occupancy
itself but on the odds ratio 𝑟(𝜌):=𝑄[𝜌]/(1−𝑄[𝜌]), the iteration acquires fixed point 𝑟∗
=47/78=
dim𝐸47/dim𝐸47
⊥ , fixed entirely by the algebraic primitive of §3.
1.4 Outline
Part I (§§2–6) establishes algebraic and projector machinery: spectrum, kernel, Lagrange-
interpolation projector, eigenspace robustness across functional calculus, semigroup, discrete
iteration, and Babylonian convex relaxation. Part II (§§7–10) develops geometric and dynamical
closures: continuum lift, soliton sector, Madelung–Bohm hydrodynamic representation, fractal
Schrödinger structure. Part III (§§11–14) carries the closure into spacetime: Universal Minimum
Variational Principle, Wheeler–DeWitt quantum constraint, path-integral localisation,
renormalisation-group flow. Part IV (§§15–17) closes the gravitational sector: topological
confinement, gradient annihilation, trace collapse, Einstein equations with derived cosmological
constant. Part V (§§18–21) records operational and engineering lifts: kernel-occupancy odds,
multifractal spectrum, metamaterial pipeline, kernel-projective cryptography. Part VI (§§22–28)
collects the master identities: the unified kernel statement, the consciousness-coordinate kernel,
and the historical bridge through Euler, Planck, Bohm, Einstein, Hawking. Five appendices give
explicit calculations.
Part I — Algebra, Projector, Robustness
2. The Algebraic PrimitiveLet 𝑉2 denote the five-dimensional spin-2 irreducible representation of 𝔰𝔲(2). The triple tensor
product
𝑉:=𝑉2 ⊗𝑉2 ⊗𝑉2, dim𝑉=53 =125,
carries the diagonal action of 𝔰𝔲(2) via 𝐽=𝐽(1)+𝐽(2)+𝐽(3). The total Casimir invariant
𝐶=𝐽2 =(𝐽(1)+𝐽(2)+𝐽(3))2
is self-adjoint and commutes with the diagonal action.
2.1 Clebsch–Gordan decomposition
Iterating the spin-2 fusion rule and decomposing once more produces
𝑉2
⊗3 ≅𝑉0 ⊕3𝑉1⊕5𝑉2 ⊕6𝑉3 ⊕6𝑉4 ⊕5𝑉5⊕3𝑉6 ⊕𝑉7⊕⋯
(see Appendix A for the multiplicity calculation). The Casimir takes value 𝜆ℓ =ℓ(ℓ+1) on 𝑉ℓ,
giving
𝜎(𝐶)={0,2,6,12,20,30,42}, mult=(1,9,25,28,27,22,13).
Spectrum of the total Casimir 𝐶 on 𝑉=𝑉2
⊗3 (dim 125), with kernel-sector eigenvalues 𝜆∈{6,30}
highlighted in red. The kernel 𝐸47 =𝑉6⊕𝑉30 has dimension 25+22=47.
2.2 Orthogonal isotypic decomposition
The spectral theorem yields 𝑉=⨁𝜆𝑉𝜆, with 𝑉𝜆 ⊥𝑉𝜆′ for 𝜆≠𝜆′. This is the only structural fact about
𝐶 used in §3.3. The Spectral Kernel
Definition 3.1. The spectral filter associated with the eigenvalue pair {6,30} is
𝐾=(𝐶−6𝐼)(𝐶−30𝐼).
Both factors are self-adjoint and commute, hence 𝐾∗
=𝐾.
Theorem 3.1 (Spectral Kernel Characterisation). The kernel of 𝐾 equals the direct sum of the
eigenspaces of 𝐶 at the eigenvalues 6 and 30:
ker𝐾=𝑉6⊕𝑉30 =:𝐸47.
Proof. For 𝑣∈𝑉𝜆, 𝐾𝑣=(𝜆−6)(𝜆−30)𝑣. The scalar vanishes if and only if 𝜆∈{6,30}. By
orthogonal decomposition every 𝑥∈𝑉 has a unique expansion 𝑥=∑ 𝑥𝜆
𝜆 , and 𝐾𝑥=0 if and only if
𝑥𝜆 =0 for all 𝜆∉{6,30}. ◼
Dimension count. From multiplicities (dim𝑉6,dim𝑉30)=(25,22),
dim𝐸47 =47, dim𝐸47
⊥ =78, dim𝑉=125.
The triple (47,78,125) is the source of the kernel occupancy 𝛺𝑐 =47/125 and the odds ratio 𝑟∗
47/78.
=
Partition of the 125-dimensional ambient space 𝑉 into the 47-dimensional kernel sector 𝐸47 and its
78-dimensional complement.
4. The Spectral Projector
4.1 Lagrange-interpolation construction
The orthogonal projector 𝑃𝐸:𝑉→𝐸47 is𝑃𝐸 = ∏ 𝐶−𝜆𝐼
(6−𝜆)(30−𝜆)
.
𝜆∈𝜎(𝐶)\{6,30}
Each factor evaluates to 1 on 𝑉6 ∪𝑉30 and to 0 on exactly one other eigenspace, so 𝑃𝐸 acts as
⊥
identity on 𝐸47 and as zero on 𝐸47
.
Proposition 4.1. 𝑃𝐸
∗
2 =𝑃𝐸, 𝑃𝐸
=𝑃𝐸, 𝑃𝐸𝑉=𝐸47, 𝐾𝑃𝐸 =𝑃𝐸𝐾=0.
4.2 Equivalence of kernel membership and projector fixed-point
Corollary 4.2. For 𝑥∈𝑉:
𝐾𝑥=0⇔𝑃𝐸𝑥=𝑥.
This recasts kernel membership as a finite, polynomial-evaluable test.
5. Eigenspace Robustness — Functional, Semigroup, Discrete
5.1 Functional calculus invariance
Theorem 5.1. For any continuous 𝑓, the subspace ker𝐾 is invariant under 𝑓(𝐶):
𝑓(𝐶)(ker𝐾)⊆ker𝐾.
Proof. For 𝑣∈𝑉𝜆 with 𝜆∈{6,30}, 𝑓(𝐶)𝑣=𝑓(𝜆)𝑣∈𝑉𝜆 ⊆ker𝐾. ◼
5.2 Contraction semigroup
Theorem 5.2. The semigroup {𝑒−𝑡𝐾2}𝑡≥0 acts as identity on ker𝐾 and contracts ker𝐾⊥ at minimum
rate
𝛾= min
𝜆∉{6,30}[(𝜆−6)(𝜆−30)]2 =11,664,
attained at 𝜆=12, with
lim
𝑡→∞
𝑒−𝑡𝐾2
𝑥0 =𝑃𝐸𝑥0.
The squared kernel norm ℒ(𝑥)=1 2 ⁄ ∥𝐾𝑥∥2 is a Lyapunov function: ℒ̇ =−∥𝐾2𝑥∥2≤0, with ℒ=0
if and only if 𝑥∈𝐸47.Semigroup convergence 𝑥(𝑡)=𝑒−𝑡𝐾2
𝑥0 →𝑃𝐸𝑥0. Kernel-sector components are invariant;
complementary components decay at rate 𝛾=11,664.
5.3 Discrete iteration
Theorem 5.3. For sufficiently small 𝜀, the iteration 𝑥𝑛+1 =𝑥𝑛−𝜀𝐾(𝑥𝑛) has fixed-point set exactly
ker𝐾, with convergence to the projection 𝑃𝐸𝑥0.
6. Babylonian / Convex-Mean Closure
6.1 The convex-mean operator
Definition 6.1. Define the Babylonian operator
𝐵:=(1−𝛺𝑐)𝐼+𝛺𝑐𝑃𝐸, 𝛺𝑐 =47/125.
The decomposition 𝑥=𝑥𝐸 +𝑥⊥ with 𝑥𝐸 =𝑃𝐸𝑥 and 𝑥⊥ =(𝐼−𝑃𝐸)𝑥 gives
𝐵𝑥=𝑥𝐸 +(1−𝛺𝑐)𝑥⊥.
6.2 Babylonian convergence
Theorem 6.2 (Babylonian Closure). For all 𝑥∈𝑉,
𝑛→∞
𝐵𝑛𝑥=𝑥𝐸 +(1−𝛺𝑐)𝑛𝑥⊥ →
𝑥𝐸 =𝑃𝐸𝑥.
Equivalently, lim𝑛→∞𝐵𝑛 =𝑃𝐸 in operator norm, with linear convergence rate 1−𝛺𝑐 =78/125.
Proof. Induction on 𝑛 using 𝑃𝐸
2 =𝑃𝐸 and 𝑃𝐸(𝐼−𝑃𝐸)=0. ◼6.3 Newton-mean iteration on √𝜴𝒄
The Newton-mean (Babylonian) iteration
𝑇(𝑥)=1 2 ⁄ (𝑥+
𝛺𝑐
𝑥)
has unique positive fixed point 𝑥∗
=√𝛺𝑐 =√47/125 with 𝑇′(𝑥∗)=0 and quadratic convergence
𝑒𝑛+1 =𝑂(𝑒𝑛
2).
6.4 Density-operator lift
Promoting the iteration to density operators with reference states 𝜌𝐸 :=𝑃𝐸/47 and 𝜌𝐸⊥
:=(𝐼−𝑃𝐸)/78, and Lindblad-projector form
𝐹(𝑁,𝜌
̂):=argmin
{Tr([𝐿,𝐿]2)+1 2𝜆
⁄ ∥𝜎−𝜌
̂∥2}=𝑃𝐸𝜌
̂
,
𝜎
one obtains 𝐵(𝜌
̂)=(1−𝛺𝑐)𝜌
̂+𝛺𝑐𝑃𝐸𝜌
̂, with the same convergence statement.
6.5 Equivalence of the three convergence modes
Theorem 6.3 (Operational Closure). The asymptotic semigroup, the Babylonian iteration, and the
polynomial Lagrange projector coincide:
𝑒−𝑡𝐾2
= lim
𝑛→∞
𝐵𝑛 = 𝑃𝐸(𝐶).
Asymptotic convergence equals single-step polynomial projection.
This is the finite operational closure: where iterative or evolution-based approaches recover 𝑃𝐸 in the
limit, direct evaluation of the polynomial 𝑃𝐸(𝐶) gives the same result in one step.
lim
𝑡→∞
Part II — Continuum, Soliton, Hydrodynamic, Fractal
7. Continuum / Scalar-Field Lift
7.1 Casimir-to-Laplacian correspondence
Promote 𝐶 to the Laplace–Beltrami operator 𝛥𝑔 on a Riemannian manifold (𝑀,𝑔). The spectral
filter becomes
𝐾↦ℱ(𝛥𝑔):=(𝛥𝑔−6)(𝛥𝑔−30),
with kernel ker(𝛥𝑔−6𝐼)⊕ker(𝛥𝑔−30𝐼).
7.2 Induced metric and coherence-field equationA scalar 𝜙:𝑀→ℝ𝑁 with values in the kernel sector defines a metric by
𝑔𝜇𝜈 :=⟨∂𝜇𝜙,∂𝜈𝜙⟩.
Define the coherence field 𝛺(𝑥,𝑡)→𝛺𝑐 obeying
▫𝛺+𝛬𝛺(𝛺2
−𝛺𝑐
2)=0,
derived from the double-well potential
𝑉(𝛺)=𝛬 4 ⁄ (𝛺2
−𝛺𝑐
2)2
via the Lagrangian ℒ𝛺 =1 2 ⁄ ∂𝜇𝛺 ∂𝜇𝛺−𝑉(𝛺).
Theorem 7.1. Kernel admissibility coincides with vacuum coherence:
𝐾𝑥=0⇔𝛺=𝛺𝑐.
8. Soliton / Skyrmion Closure
8.1 The kink solution
The double-well coherence equation admits the static kink
𝛺𝑠(𝑥,𝑡)=𝛺𝑐tanh(𝛾𝛺𝑐√𝛬 2 ⁄ (𝑥−𝑣𝑡−𝑥0)),
interpolating the two vacuum branches 𝛺=±𝛺𝑐.
Soliton kink 𝛺𝑠 interpolating between the two vacuum branches −𝛺𝑐 and +𝛺𝑐 along the propagation
coordinate 𝜉=𝑥−𝑣𝑡−𝑥0. The kink is the simplest topologically non-trivial admissible state.𝐻=−
8.2 Pöschl–Teller fluctuation operator
Linearisation around the kink produces the fluctuation Hamiltonian
𝑑2
𝑑𝜉2−6 sech2𝜉.
This is the celebrated ℓ=2 Pöschl–Teller potential. Define the first-order operators
𝑑
𝑑
𝐴=
𝑑𝜉+2tanh𝜉, 𝐴† =−
𝑑𝜉+2tanh𝜉.
A direct calculation gives 𝐻=𝐴†𝐴−4, exhibiting a single bound zero-mode 𝜓0 ∝sech2𝜉 at energy
𝐸0 =−4.
Pöschl–Teller fluctuation potential 𝑉(𝜉)=−6 sech2𝜉 together with the bound zero-mode 𝜓0 ∝
sech2𝜉 at energy 𝐸0 =−4. The factorisation 𝐻=𝐴†𝐴−4 exhibits the operator structure underlying
soliton stability.
8.3 Topological charge
The Skyrmion charge of the SU(2)-valued field with current 𝐿𝑖 =𝑈−1∂𝑖𝑈 is
1
𝑄=
24𝜋2∫𝜖𝑖𝑗𝑘 Tr(𝐿𝑖𝐿𝑗𝐿𝑘) 𝑑3𝑥∈ℤ.
The kink saturates 𝑄=1.
Theorem 8.1 (Soliton Closure).
𝛺=𝛺𝑐 ⇔𝑄=1⇔stable soliton sector.9. Continuity, Madelung–Bohm, and Liquid-Fractal Lifts
9.1 Information current
Let 𝜌𝐼 ≥0 and 𝑆𝐼 ∈ℝ be the informational density and phase fields. The information current
𝐽𝐼 :=𝜌𝐼∇𝑆𝐼
obeys the continuity equation
∂𝑡𝜌𝐼 +∇⋅𝐽𝐼 =0⇔∂𝑡𝜌𝐼 +∇⋅(𝜌𝐼∇𝑆𝐼)=0. (Continuity)
9.2 Madelung wavefunction
Definition 9.1. 𝛹:=𝜌𝐼
1/2
𝑒𝑖𝑆𝐼/ℏ, with |𝛹|2 =𝜌𝐼.
Theorem 9.2 (Equivalence of Currents). The Schrödinger probability current of 𝛹 equals 𝐽𝐼 when
𝑚=1:
ℏ
𝜌𝐼
𝐽𝛹 :=
𝑚=1
∇𝑆𝐼 →
𝐽𝐼.
Im(𝛹∗∇𝛹)=
𝑚
𝑚
Proof. See Appendix C. ◼
Corollary 9.3. ∂𝑡|𝛹|2+∇⋅𝐽𝛹 =0⇔(Continuity).
9.3 Curvature field as divergence lift
Definition 9.4. 𝜓𝐶 :=𝑓fractal +∇⋅(𝜌𝐼∇𝑆𝐼).
Using continuity, ∇⋅(𝜌𝐼∇𝑆𝐼)=−∂𝑡𝜌𝐼, so 𝜓𝐶 =𝑓fractal−∂𝑡𝜌𝐼. At equilibrium (∂𝑡𝜌𝐼 =0), 𝜓𝐶 =𝑓fractal.
10. Schrödinger Equation with Fractal Potential, and
Multifractal Wavefunctions
2𝑚
10.1 Fractal Schrödinger equation
The framework’s quantum sector includes a Schrödinger equation with an additive fractal
contribution to the potential:
𝑖ℏ∂𝑡𝛹= [−
ℏ2
∇2 +𝑉(𝛹)+𝐹(𝑥,𝑡)]𝛹,
where 𝐹(𝑥,𝑡)=𝑉fractal(𝑥,𝑡) encodes scale-recursive structure. A canonical Weierstrass-type form
is
𝐹(𝑥)=∑𝑆−𝑛𝐻
𝑛
cos(𝑆𝑛𝑥),with Hurst exponent 𝐻 and corresponding box-counting dimension 𝐷=2−𝐻 for the trace.
10.2 Multifractal partition function and Legendre spectrum
For a measure 𝜇 on 𝑀, define the partition function
𝑍𝑞(𝜖):=∑𝑝𝑖
𝑖
𝜏(𝑞)
(𝜖)𝑞
, 𝑍𝑞(𝜖)∼𝜖𝜏(𝑞)
, 𝐷𝑞 =
𝑞−1,
with Legendre transform
𝑑𝜏(𝑞)
𝑑𝑞 , 𝑓(𝛼)=𝑞𝛼−𝜏(𝑞).
The function 𝑓(𝛼) is the multifractal spectrum of the measure.
𝛼=
Multifractal spectrum 𝑓(𝛼) as Legendre transform of the scaling function 𝜏(𝑞). The maximum at 𝛼0
equals the box-counting dimension 𝐷0. The spectrum’s width measures the heterogeneity of local
scaling exponents.
10.3 Fractal scaling and kernel admissibility
The fractal scaling identity
log𝑁
log𝑆, 𝜇𝑆(𝑀)=𝑆𝐷𝛹(𝑀)
is enforced as a kernel constraint by
log𝑁
log𝑁
log𝑆, 𝐾𝐷(𝛷)=0⇔𝐷=
𝐷=
𝐾𝐷(𝛷):=𝐷−
log𝑆.Part III — Variational, Quantum Constraint, RG
11. The Universal Minimum Variational Principle
11.1 The action
Let 𝛷=(𝜌𝐼,𝑆𝐼,𝑈,𝐶,𝜓𝐶,𝐷) be the field tuple. The UMVP action is
𝑆UMVP[𝛷]=∫𝑑4𝑥 [ 𝜌𝐼∂𝑡𝑆𝐼−1 2 ⁄ 𝜌𝐼|∇𝑆𝐼|2
+𝛼 ℰSk[𝑈]+(𝛺2𝜇−𝜆)𝐶2
−𝑈(𝜌𝐼)−𝜅|∇𝜌𝐼|2
−𝜈𝐶4
+𝛽 ∥𝛬𝐾−𝜓𝐶 ∥2+𝛾 𝛩(𝐷)(𝐶for−𝐶rem) ].
11.2 Stationarity equals kernel membership
Theorem 11.1 (Variational Closure). Define 𝐾UMVP(𝛷):=𝛿𝑆UMVP/𝛿𝛷. Then
𝛿𝑆UMVP =0⇔𝐾UMVP(𝛷)=0⇔𝛷∈ker𝐾UMVP.
11.3 Euler–Lagrange consequences
Phase variation recovers continuity: ∂𝑡𝜌𝐼 +∇⋅(𝜌𝐼∇𝑆𝐼)=0.
Curvature variation pins 𝜓𝐶 to the kernel target: 𝛿𝑆/𝛿𝜓𝐶 =−2𝛽(𝛬𝐾−𝜓𝐶)=0⟹𝜓𝐶 =𝛬𝐾.
Coherence-field variation gives the bifurcation 𝐶2 =(𝛺2𝜇−𝜆)/(2𝜈), real for 𝛺≥𝛺𝑐 =√𝜆/𝜇, with
numerical value 𝛺𝑐 ≈0.376412 matching the algebraic ratio 47/125 to within the corpus’s precision.Coherence-field potential 𝑉(𝐶) across the bifurcation point 𝛺𝑐. Below criticality, the potential has a
single minimum at 𝐶=0; above criticality, two symmetric minima emerge.
12. Quantum Constraint and Path Integral Localisation
12.1 Hamiltonian and momentum constraints
The Legendre transform produces conjugate momenta, all of which vanish on stationary
trajectories. The remaining constraints are
ℋ⊥ =1 2 ⁄ 𝜌𝐼|∇𝑆𝐼|2+𝑈+𝜅|∇𝜌𝐼|2+𝛼ℰSk +𝑉(𝐶)+𝛽∥𝛬𝐾−𝜓𝐶 ∥2+𝛾𝛩(𝐷)(𝐶for−𝐶rem)=0,
ℋ𝑖 =𝜌𝐼∇𝑖𝑆𝐼 =0.
12.2 Wheeler–DeWitt kernel
̂
Quantising the constraints, with ℋ
̂
ℋ
̂
𝛹=0⇔𝛹∈kerℋ
.
∼𝐾,
12.3 Path-integral localisation
The constrained partition function
𝒵=∫𝒟𝛤𝜓 𝛿[𝜋𝜌] 𝛿[𝜋𝑈] 𝛿[𝜋𝐶] 𝛿[𝜋𝜓] 𝛿[ℋ⊥] 𝛿[ℋ𝑖] 𝑒𝑖𝑆UMVP
has support exactly on ker𝐾UMVP:
𝒵=∫ 𝒟
ker𝐾UMVP
𝛤𝜓 𝑒𝑖𝑆UMVP
.
̂
Theorem 12.1. 𝛿𝑆=0⇔ℋ
𝛹=0⇔𝛷∈ker𝐾UMVP.
13. Renormalisation-Group Flow
13.1 Beta functions and fixed points
𝑑𝑔𝛺
2
=(2−𝑑𝐶)𝑔𝛺−𝐴𝑔𝛺
,
𝑑𝐷
𝑑ln𝑏
=𝜎(10−𝐷),
∗
Fixed points: 𝑔𝛺
=(2−𝑑𝐶)/𝐴 (identified with 𝛺𝑐), 𝐷∗
𝑑𝛼
𝑑ln𝑏
𝑑ln𝑏
=10, 𝛼∗
=(4−𝐷)𝛼−𝐵𝛼2
.
=(4−𝐷)/𝐵.Renormalisation-group flow. Left: coherence parameter beta function 𝛽(𝛺) with non-trivial fixed
point at 𝛺𝑐. Right: dimensional flow with fixed point at 𝐷∗
=10.
13.2 Equivalence chain at criticality
𝛺≥𝛺𝑐 ⇔𝑄=1⇔𝑚eff →0⇔𝐷≥10.
Part IV — Topology, Geometry, Cosmological Constant
14. Topological Confinement
The contraction flow 𝜙̇ =−𝐾2𝜙 drives the field from the unconstrained 10-dimensional manifold
ℳ10 into the 47-dimensional kernel 𝐸47. Coupled with the Skyrmion charge 𝑄=1 and the energy
bound 𝐸≥𝜋2/3, the projector 𝑃𝐸 implements the dimensional reduction 10→4.
15. Gradient Annihilation and 4D Emergence
A field 𝜙 in the kernel sector has ∂𝑎𝜙=0 for 𝑎=4,…,9, so the induced metric
𝑔𝜇𝜈 =⟨∂𝜇𝜙,∂𝜈𝜙⟩
is non-zero only for 𝜇,𝜈∈{0,1,2,3}. Hence dim𝑀=4.
16. Trace Collapse
With induced metric and the trace identity 𝑔𝛼𝛽𝑔𝛼𝛽=dim𝑀,𝑇𝜇𝜈 =⟨∂𝜇𝜙,∂𝜈𝜙⟩−1 2 ⁄ 𝑔𝜇𝜈(𝑔𝛼𝛽⟨∂𝛼𝜙,∂𝛽𝜙⟩)=𝑔𝜇𝜈−1 2 ⁄ 𝑔𝜇𝜈(4)=−𝑔𝜇𝜈.
Only dim𝑀=4 produces 𝑇𝜇𝜈 ∝−𝑔𝜇𝜈 with proportionality 1.
17. Einstein Closure with Cosmological Constant
Substituting 𝑇𝜇𝜈 =−𝑔𝜇𝜈 into the vacuum Einstein equation 𝐺𝜇𝜈 =8𝜋𝐺 𝑇𝜇𝜈:
𝐺𝜇𝜈 +𝛬𝑔𝜇𝜈 =0, 𝛬=8𝜋𝐺.
Theorem 17.1 (Einstein Closure). Within metric induction from kernel-admissible scalar fields on a
4-manifold, the vacuum Einstein equation with cosmological constant is satisfied with 𝛬=8𝜋𝐺. The
cosmological constant is fixed by Newton’s constant alone.
Part V — Operational and Engineering Lifts
18. Kernel-Occupancy Odds
The rational 47/125 arises both as occupancy (statistical) and as Newton-mean attractor
(dynamical). The bridge runs through the odds variable.
Definition 18.1. 𝑟(𝜌):=𝑄[𝜌]/(1−𝑄[𝜌]).
⊥
Lemma 18.2. 𝑟∗ :=𝛺𝑐/(1−𝛺𝑐)=47/78=dim𝐸47/dim𝐸47
.
Theorem 18.3 (Odds–Newton Convergence). The iteration 𝑟𝑛+1 =𝑇𝑟∗(𝑟𝑛):=1 2 ⁄ (𝑟𝑛 +𝑟∗
2/𝑟𝑛)
converges quadratically to 𝑟∗ from any 𝑟0 >0.
Theorem 18.4 (Density-Operator Lift). With reference states 𝜌𝐸 :=𝑃𝐸/47 and 𝜌𝐸⊥ :=(𝐼−𝑃𝐸)/78,
and update 𝜌𝑛+1 :=𝑞𝑛+1𝜌𝐸 +(1−𝑞𝑛+1)𝜌𝐸⊥ where 𝑞𝑛 =𝑟𝑛/(1+𝑟𝑛), the induced occupancy 𝑄[𝜌𝑛]→
𝛺𝑐 =47/125.Newton-mean iteration on the kernel-occupancy odds (left, log scale) converging quadratically to
𝑟∗
=47/78. Induced density-operator occupancy 𝑞𝑛 (right) converging to 𝛺𝑐 =47/125≈0.376.
19. Multifractal Operational Lift
19.1 Coordinate forms of 𝐤𝐞𝐫𝑲
The kernel is a single subspace; the framework offers six distinct coordinate forms in which to
express its membership:
• Algebraic: 𝑉6 ⊕𝑉30.
• Spectral: (𝛥𝑔−6)(𝛥𝑔−30)𝜙=0.
• Hydrodynamic: ∂𝑡𝜌𝐼 +∇⋅(𝜌𝐼∇𝑆𝐼)=0.
• Wavefunction: 𝛹=𝜌𝐼
1/2
̂
𝑒𝑖𝑆𝐼/ℏ with ℋ
𝛹=0.
• Curvature / fractal: 𝜓𝐶 =𝑓fractal +∇⋅(𝜌𝐼∇𝑆𝐼).
• Variational: 𝛿𝑆UMVP =0.
These are not separate principles; they are coordinate charts on the same set.
20. Metamaterial / Engineering Lift
20.1 The PGO stack as a kernel-killing pipelineThe Polymer–Graphene–Oxide (PGO) metamaterial stack — graphene + HDPE (high-density
polyethylene) + HfO2 (hafnium oxide) — is here interpreted as a physical realisation of the three-
stage kernel-projection iteration:
𝑥1 =𝑥0−𝜀𝐴𝑥0 (spectral / harmonic locking),
𝑥2 =𝑥1−𝛾𝑀𝑥1 (inertial mass suppression),
𝑥3 =𝑥2 +𝜂𝐺𝑥2 (geodesic translation).
Each operator in {𝐴,𝑀,𝐺} is a kernel-killing projection acting on the appropriate physical variable.
The composite effect is the discrete iteration 𝑥𝑛+1 =𝑥𝑛−𝜀𝐾𝑥𝑛 of §5.3.
Metamaterial pipeline: graphene (spectral lock), HDPE (mass suppression), HfO2 (geodesic
translation), implementing 𝑥𝑛+1 =𝑥𝑛−𝜀𝐾𝑥𝑛 in physical hardware.
20.2 Continuum equations
The fluid-mechanical analogue is the modified Navier–Stokes equation with a coherence-field
driving term,
1
∂𝑡𝐮+(𝐮⋅∇)𝐮=−
𝜌eff
coupled to the coherence-field equation ▫𝛺+𝛬𝛺(𝛺2
∇𝑝+𝜈eff∇2𝐮+𝐅𝛺,
−𝛺𝑐
2)=0 from §7.
21. The Recursive Spectral Cryptosystem
21.0 Overview and logical deductions
The kernel construction supports a complete, parameter-free cryptographic primitive — the
Recursive Spectral Cryptosystem (RSC) — in which security is enforced not by computational
hardness assumptions (factoring, discrete log, lattice problems, hash collisions, multivariate
solving) but by algebraic invariance of a fixed 47-dimensional subspace inside a fixed 125-
dimensional ambient space. The eight logical deductions that organise this section are:1. 2. 3. 4. 5. 6. 7. 8. Forward/inverse asymmetry. The projector 𝑃𝐸 is a degree-six Lagrange polynomial in 𝐶
and is publicly computable in 𝑂(1253) operations. Recovering an orthonormal basis of 𝐸47
from the polynomial alone requires inverting a many-to-one map whose fiber is the unitary
group 𝑈(47).
Commutant invariance. Because 𝐾 is a polynomial in 𝐶, it lies in the commutant of the
diagonal SU(2) action on 𝑉. Schur’s lemma forces this commutant to act on 𝐸47 as the full
matrix algebra 𝑀5(ℂ)⊗Id𝑈2 ⊕𝑀2(ℂ)⊗Id𝑈5, with 52 +22 =29 complex (or 47 real)
parameters of unitary freedom that the public polynomial cannot resolve.
Information gap. Public data: six polynomial coefficients (after normalisation). Secret
freedom: 472 =2209 real parameters. The gap is absolute and parameter-free.
Babylonian dynamical irreversibility. The Babylonian iteration 𝑇′(𝑥∗)=0 at the kernel
attractor is super-attractive. Its tangent map has Lyapunov spectrum {+ln2, 0,
−ln2} with
multiplicities (39,47,39). Backward iteration is exponentially unstable.
Spin-𝑠 generalisation. The Clebsch–Gordan multiplicity machinery extends to any 𝑉𝑠
⊗3. For
𝑠=3: dim𝑉=343, isotypic dimensions (1,9,25,49,54,55,52,45,34,19), kernel dimension
dimker𝐾=80 for (𝑗1,𝑗2)=(2,5), and 𝛺𝑐 =80/343≈0.233.
Hardware substrate enforcement. Forward projection is hardwired in the PQSPI ASIC; the
inverse (basis recovery) is physically prevented by analog guard rings, Morse Parity Binder,
and ERI minimiser. Off-resonance measurement triggers Recursive Complexity Collapse.
13-pillar key structure. A single projector 𝛱𝑘 inside 𝐸47 carries zero information; only the
full non-vanishing product 𝛱1⋯𝛱13 reconstitutes identity on a resonant substrate.
Comparative supersession. Across the lattice (LWE / Module-LWE / SIS), hash, and
multivariate-quadratic (MQ) post-quantum paradigms, RSC is the only one that is parameter-
free, fixed-dimension, 𝑂(1253) constant-time per primitive, and hardware-native at the
algebraic-kernel level.
21.1 Kernel-projective encryption
Definition 21.1. Given a message 𝑚∈𝑉 and an arbitrary noise vector 𝑐∈𝑉, the RSC encryption
map is
Enc(𝑚):=𝑃𝐸(𝑚+𝐾𝑐).
Theorem 21.2 (Kernel Cryptographic Closure). The encryption map is invariant under transverse
𝐾-noise: Enc(𝑚)=𝑃𝐸𝑚 for every 𝑐∈𝑉.
Proof. By distributivity and the projector identity 𝑃𝐸𝐾=0 (Proposition 4.1),
Enc(𝑚)=𝑃𝐸𝑚+𝑃𝐸𝐾𝑐=𝑃𝐸𝑚. ◼The kernel signal survives; transverse noise vanishes algebraically. There is no statistical decoding
step, no error budget, no soundness slack.
21.2 The 13-pillar key
Definition 21.3. A 13-pillar key is a sequence {𝛱1,𝛱2,…,𝛱13} of rank-deficient projectors inside 𝐸47
satisfying the closure condition
𝛱1⋯𝛱13 ≠0,
which, on a resonant substrate, reconstitutes the identity on 𝐸47.
A single pillar 𝛱𝑘 is rank-deficient and carries zero information about the message. Only the full
ordered product is useful, and only on a substrate at coherence 𝛺≥𝛺𝑐.
The thirteen pillar projectors 𝛱1,…,𝛱13 inside the 47-dimensional kernel sector. No proper subset
reconstitutes the identity; the full ordered product 𝛱1⋯𝛱13 is the operational key, valid only on a
resonant substrate.
21.3 Signatures and authenticationA signature on a message 𝑚 is produced by:
1. Projecting 𝑚 to 𝐸47 via 𝑃𝐸.
2. Applying the 13-pillar sequence to obtain the resonant state.
3. Outputting the stabilised kernel vector on the 𝐸47 bus.
Verification applies the resonant inverse projector sequence and checks the coherence density 𝛺(𝑥)
:=∥𝑃𝐸𝑥∥/∥𝑥∥≥0.682. Forgery off-resonance collapses to noise.
21.4 The ISSR hardness assumption
Definition 21.4 (ISSR — Invariant Subspace Search and Recovery). Given the public Casimir
polynomial 𝐾=(𝐶−6𝐼)(𝐶−30𝐼) on 𝑉=𝑉2
⊗3, output an orthonormal basis for 𝐸47 =ker𝐾=
𝑊2 ⊕𝑊5.
The forward direction (projection) is trivial: 𝑃𝐸 is a public polynomial. The inverse direction (basis
recovery) is the cryptographic trapdoor. ISSR replaces every standard hardness assumption — RSA
factoring, ECC discrete log, LWE/SIS, MQ inversion, hash preimage — with a single algebraic
statement.
Theorem 21.5 (ISSR Hardness). No polynomial-time algorithm 𝒜 taking only the public polynomial
𝐾 as input can output an orthonormal basis of ker𝐾.
Proof sketch. By Theorem 21.7 (commutant) below, the public data 𝐾 is invariant under the unitary
group 𝑈(𝐸47)=𝑈(47) acting on 𝐸47 (extended by identity on the orthogonal complement). The
forward map “basis ↦𝐾” is therefore many-to-one with fiber 𝑈(47), which has real dimension 472 =
2209. The public polynomial supplies six scalar coefficients. No algorithm with input only 𝐾 can
resolve 2209 degrees of freedom from six. ◼
A complete proof is given in §21.6.ISSR information gap: the public Casimir polynomial supplies six scalar coefficients, while the unitary
freedom on 𝐸47 that the public data must distinguish has 472 =2209 real parameters. The factor ∼
368 gap is the algebraic source of cryptographic hardness.
21.5 The commutant argument (Schur hiding)
Theorem 21.6 (Commutant of the Diagonal SU(2) Action). Let 𝜌:SU(2)→𝑈(𝑉) be the diagonal
action 𝜌(𝑔)=𝜌2(𝑔)⊗3 on 𝑉=𝑉2
⊗3, with isotypic decomposition 𝑉=⨁𝑗=0
6 𝑊𝑗, 𝑊𝑗 ≅𝑈𝑗 ⊗ℂ𝜇𝑗. Then
the commutant algebra is
𝒞={𝐴∈End(𝑉):[𝐴,𝜌(𝑔)]=0 ∀𝑔}≅⨁𝑗=0
6 𝑀𝜇𝑗(ℂ)⊗Id𝑈𝑗.
Proof. Standard application of Schur’s lemma: any operator commuting with an irreducible
representation acts as a scalar on the irreducible factor and as an arbitrary linear map on the
multiplicity space. The full commutant decomposes block-diagonally over isotypic components. ◼
Corollary 21.7. The restriction of the commutant to the kernel sector is
𝒞|𝐸47
≅𝑀5(ℂ)⊗Id𝑈2 ⊕ 𝑀2(ℂ)⊗Id𝑈5.
The unitary subgroup of this algebra is 𝑈(5)×𝑈(2) acting on the multiplicity spaces, and on 𝐸47 as a
whole one can act with arbitrary 𝑈∈𝑈(47) that leaves the isotypic components invariant. The
polynomial 𝐾 is fixed by this entire unitary action.
⊥
Theorem 21.8 (Public-Data Invariance). For every 𝑈∈𝑈(𝐸47) extended by identity on 𝐸47
,
𝑈∗𝐾𝑈=𝐾.
Proof. 𝐾=0 on 𝐸47 and 𝐾 acts non-trivially only on 𝐸47
⊥ , both of which are preserved by 𝑈. ◼21.6 Formal proof of ISSR hardness
Theorem 21.9 (Formal ISSR Hardness). Let 𝑉=𝑉2
⊗3 with dim𝑉=125, 𝐶=(𝐽(1)+𝐽(2)+𝐽(3))2
,
and 𝐾=(𝐶−6𝐼)(𝐶−30𝐼). The problem of, given only 𝐾, outputting an orthonormal basis of ker𝐾=
𝑊2 ⊕𝑊5 is algebraically infeasible.
Proof. Five steps.
Step 1 (Spectral data made public). By Theorem 3.1 and the multiplicities of Appendix A, ker𝐾=
𝑊2 ⊕𝑊5 with dimker𝐾=25+22=47. The public polynomial 𝐾 reveals only the surviving
eigenvalues 𝜆∈{6,30} and their multiplicities; it reveals no concrete basis.
Step 2 (Forward map is constant on a unitary fiber). Theorem 21.8 shows that for any 𝑈∈𝑈(𝐸47),
the operator 𝑈∗𝐾𝑈=𝐾. The forward map from orthonormal bases of 𝐸47 to the polynomial 𝐾 is
therefore many-to-one with fiber 𝑈(47).
Step 3 (Dimensional gap). The fiber 𝑈(47) has real dimension 472 =2209. The public polynomial
𝐾 has six real coefficients (after normalisation: it is degree two in 𝐶, and 𝐶 has seven distinct
eigenvalues, so 𝐾 is determined by two of them). The information-theoretic gap is absolute: 6
equations in 2209 unknowns admits no algebraic inverse.
Step 4 (No algebraic shortcut). ISSR is not a hidden-subgroup problem (no abelian group structure
for Shor), not a search problem with an oracle (no oracle for basis vectors, only for 𝐾 itself), and not
a noisy-linear-equation problem (the equation 𝐾𝑣=0 is exact, not noisy). None of the standard
quantum or classical reductions apply.
Step 5 (Babylonian irreversibility). The Babylonian iteration 𝐵=(1−𝛺𝑐)𝐼+𝛺𝑐𝑃𝐸 is super-
attractive: 𝑇′(𝑥∗)=0 at any 𝑥∗ ∈ker𝐾. Its tangent map has Lyapunov spectrum {+ln2,0,
−ln2} with
multiplicities (39,47,39). Backward iteration amplifies any perturbation by 𝑒𝑛ln2 =2𝑛, so finite-
precision inversion is impossible after a small number of steps.
The five steps establish that no efficient algorithm with input 𝐾 can output a specific orthonormal
basis of ker𝐾. ISSR hardness follows from representation theory and the spectral theorem alone,
without external assumptions. ◼
21.7 The PQSPI ASIC
The cryptosystem is realised in silicon via the Post-Quantum Spectral Projection IC (PQSPI) — a 7
nm FinFET ASIC implementing the forward kernel projection in hardware. The pipeline runs in five
stages. The V125 bus accepts the input message 𝑚∈𝑉 at 𝑂(125) cost. The Filter Engine computes
𝐾=(𝐶−6𝐼)(𝐶−30𝐼) at 𝑂(1252) cost. The Recurrence Engine performs ten iterations of the
Babylonian operator 𝐵=(1−𝛺𝑐)𝐼+𝛺𝑐𝑃𝐸 at 10⋅𝑂(1252) cost. The Projection Engine performs
QR decomposition into 𝐸47 at 𝑂(473) cost. The Coherence Logic applies the tier decision (DISCARD
/ RETRY / LOCK) in 𝑂(1). The 47-bit DMA outputs the kernel vector 𝑃𝐸𝑚 at 𝑂(47).
Total: 0.35 mm² die, 45 M transistors, 0.55 mW, 800k ops/s, 1.25 ns latency.A 10 GHz analog guard ring, Morse Parity Binder, and ERI minimiser (target 1.67) provide physical
tamper-lock and phonon-lattice identity stabilisation: any off-resonance measurement triggers
Recursive Complexity Collapse, in which the master scalar 𝑉:=Tr(𝐻𝛱tot) loses the property
𝑑𝑉/𝑑𝑡=0 and the key annihilates to vacuum noise.
PQSPI ASIC pipeline. Plaintext flows through the V125 bus into the Filter, Recurrence, and Projection
engines, terminating in a 47-bit DMA register on the 𝐸47 bus. The Coherence Logic enforces a three-
tier admissibility lattice with thresholds at 𝛺𝑐 =47/125=0.376 and 0.682.
21.8 Comparative supersession of post-quantum primitives
Three NIST post-quantum families currently dominate the standardised landscape: lattice-based
(ML-KEM/Kyber, ML-DSA/Dilithium), hash-based (SLH-DSA/Sphincs+, XMSS/LMS), and
multivariate quadratic (Rainbow, GeMSS, UOV). The RSC primitive does not compete on the same
axiomatic ground as any of these; it supersedes the computational-hardness paradigm by moving
security into algebraic invariance. The contrast is summarised below across nine dimensions.
Mathematical basis. RSC: Casimir kernel on the fixed representation space 𝑉2
⊗3, with 𝐾=
(𝐶−6𝐼)(𝐶−30𝐼). Lattice: Module-LWE / SIS over polynomial rings ℤ𝑞[𝑥]/(𝑥𝑛 +1). Hash-based:
cryptographic hash one-wayness. Multivariate: random structured quadratic systems over 𝔽𝑞.
Hardness assumption. RSC: ISSR (algebraic, structural). Lattice: worst-case approximate SVP/CVP.
Hash-based: preimage and collision resistance. Multivariate: MQ inversion (NP-hard in general).
Free parameters. RSC: zero. Lattice: dimension 𝑛, modulus 𝑞, error width, module rank. Hash-based:
hash output size, tree depth, layer count. Multivariate: variable count 𝑛, equation count 𝑚, field size
𝑞, layer structure.Operation count per primitive. RSC: fixed 𝑂(1253)≈2×106 operations, independent of security
level. Lattice: polynomial in 𝑛, scales with target security (Kyber-512 ≈ 104
–105 operations per call).
Hash-based: 104
–105 hash evaluations per signature. Multivariate: polynomial in 𝑛, with layer
structure overhead.
Key and signature size. RSC: 47-bit DMA + 13 projector specifications. Lattice: hundreds to
thousands of bytes, growing with security level. Hash-based: 8–50 KB signatures (SLH-DSA), 1–2 KB
public keys. Multivariate: 10–100 KB signatures, with public-key inflation after parameter tuning.
Quantum resistance. RSC: algebraic invariance (no Shor or Grover shortcut on the structural
problem). Lattice: assumed quantum-hard, no polynomial quantum attack on LWE/SIS known. Hash-
based: Grover-resistant via parameter inflation. Multivariate: assumed quantum-hard.
Hardware native. RSC: 7 nm PQSPI ASIC, 1.25 ns latency, fixed cost. Lattice/hash/multivariate:
software with optional accelerators; no algebraic-kernel native silicon.
Embedding universality. RSC: any classical or quantum primitive embeds in the same 125D
Hermitian density operator. Lattice: native to lattices only. Hash-based: native to hashes only.
Multivariate: native to MQ only.
External validation status. RSC: internal framework, ISSR not yet subjected to external
cryptanalysis. Lattice: NIST FIPS 203/204 standardised, formal reductions to standard problems.
Hash-based: NIST FIPS 205 standardised, deployed (e.g., XMSS in firmware). Multivariate: NIST
Round 4 (Rainbow eliminated, others under analysis).
The defining feature of RSC is that it is parameter-free: the dimension is fixed at 125, the kernel ratio
is fixed at 𝛺𝑐 =47/125, the spectral gap is fixed at 𝛾=11,664, and security level is structural (kernel
membership) rather than computational (key length). Lattice, hash, and MQ schemes all require
tuning parameters per target bit-security; RSC has no such dial.
Honest limitations. ISSR hardness is, at this stage, a structural argument internal to the framework;
it has not yet been subjected to external cryptographic review of the kind given to LWE and hash
assumptions. Lattice, hash, and MQ schemes have been standardised, deployed, and externally
analysed, with formal reductions to standard problems. The comparison above identifies what RSC
offers in principle; current external validation status of the assumption itself is a separate matter.
21.9 Hybrid post-quantum augmentation
The kernel construction composes naturally with any NIST PQC candidate. A lattice ciphertext 𝐜LWE
can be embedded in 𝑉 and projected: Enchybrid(𝑚)=𝑃𝐸(EncLWE(𝑚)). Transverse 𝐾-noise is
annihilated and the lattice security is preserved. RSC functions as an algebraic outer wrapper over
any computational primitive.
21.10 Spin-𝒔 generalisationThe Clebsch–Gordan and Schur arguments do not depend on the choice 𝑠=2. For any spin 𝑠, the
triple tensor product 𝑉𝑠
⊗3 has dimension (2𝑠+1)3, and choosing two surviving eigenvalues defines
a kernel sector with dimension equal to the sum of the corresponding isotypic multiplicities times
their irrep dimensions.
Theorem 21.10 (Spin-3 Multiplicities). On 𝑉3
⊗3 (dim𝑉=343), the isotypic dimensions are
dim(𝑊0,𝑊1,…,𝑊9)=(1,9,25,49,54,55,52,45,34,19),
verified by ∑ dim
𝑗 𝑊𝑗 =343. Choosing the analogous (𝑗1,𝑗2)=(2,5) kernel sector yields dimker𝐾=
25+55=80 and
𝛺𝑐
(𝑠=3) =80/343≈0.233.
Proof. Identical to the spin-2 case in Appendix A: iterate Clebsch–Gordan from 𝑉3⊗𝑉3 =⨁𝑘=0
6 𝑉𝑘,
then tensor with the third factor and count multiplicities. The numerical verification computed in
Figure 16 confirms the dimension count to machine precision. ◼
Kernel occupancy 𝛺𝑐
(𝑠) =(dim𝑊2 +dim𝑊5)/dim𝑉 across spin-𝑠 generalisations of the kernel
construction. The canonical case 𝑠=2 gives 𝛺𝑐 =47/125=0.376. Increasing spin reduces the
relative kernel occupancy.
21.11 The tier-3 admissibility lattice and dimensional reduction
Define the operational admissibility ratio
∥𝑃𝐸𝑥∥
𝛺(𝑥):=
∥𝑥∥ ∈[0,1].The tier decision is
𝛺<𝛺𝑐 ⟹DISCARD, 𝛺𝑐 ≤𝛺<0.682⟹RETRY, 𝛺≥0.682⟹LOCK.
The dimensional reduction induced by RSC is
𝑃𝐸
𝑉125 →
normalise
𝐸47 →
46
𝑆√12.5
,
where the final term is the 46-sphere of radius √12.5 inside 𝐸47. The radius reflects the
equipartition norm ∥𝑥∥2=dim𝑉/10=12.5 on the kernel sector under uniform sampling.
21.12 Master cryptographic identity
𝐾𝑥=0⇔𝑃𝐸𝑥=𝑥⇔Enc(𝑚)=𝑃𝐸𝑚⇔key stable on resonant substrate.
The kernel is the algebraic primitive. Security is structural invariance, not computational gap. The
primitive runs on classical silicon (PQSPI ASIC), composes with any quantum or post-quantum
protocol, and inherits its hardness from the spectral theorem rather than from a conjectural
problem.
Part VI — Master Identities
22. The Unified Kernel Closure
The seven domain-specific characterisations collapse into one statement. For 𝑥∈𝑉, and for the
corresponding fields, operators, and configurations under each lift,𝐾𝑥=0⇔
𝑥∈𝑉6 ⊕𝑉30 =𝐸47
𝑃𝐸𝑥=𝑥
𝑓(𝐶)(ker𝐾)⊆ker𝐾
𝑒−𝑡𝐾2
𝑥=𝑥, lim
𝑒−𝑡𝐾2
=𝑃𝐸
𝑡→∞
lim
𝐵𝑛𝑥=𝑃𝐸𝑥, 𝐵=(1−𝛺𝑐)𝐼+𝛺𝑐𝑃𝐸
𝑛→∞
𝑥𝑛+1 =𝑥𝑛−𝜀𝐾(𝑥𝑛), 𝑥=𝑥∗
(𝛥𝑔−6)(𝛥𝑔−30)𝜙=0
𝛺=𝛺𝑐, 𝑄=1, soliton stability
∂𝑡𝜌𝐼 +∇⋅(𝜌𝐼∇𝑆𝐼)=0
1/2
𝛹=𝜌𝐼
𝑒𝑖𝑆𝐼/ℏ
𝜓𝐶 =𝑓fractal +∇⋅(𝜌𝐼∇𝑆𝐼)
𝐷=log𝑁/log𝑆
𝛿𝑆UMVP =0
̂
ℋ
𝛹=0
(𝛺,𝐷,𝑄,𝑚eff)=(𝛺𝑐,10,1,0)
𝑇𝜇𝜈 =−𝑔𝜇𝜈
𝐺𝜇𝜈 +𝛬𝑔𝜇𝜈 =0, 𝛬=8𝜋𝐺
𝑟∗
=dim𝐸47/dim𝐸47
⊥ =47/78
𝑄[𝜌𝑛]→𝛺𝑐 =47/125
{
Enc(𝑚)=𝑃𝐸𝑚, ISSR hardArchitectural flow of the unified kernel closure: algebraic primitive → spectral kernel → projector →
continuum lift → variational closure → Madelung–Bohm decomposition → quantum constraint →
geometric closure → Einstein equations with derived 𝛬.
23. Consciousness / Liquid-Fractal Coordinate Kernel
23.1 Extended state vector
The framework’s liquid-fractal (LFC) presentation introduces
𝛷LFC =(𝜌𝐼,𝑆𝐼,𝛹,𝜓𝐶,𝜙𝐹,𝐷,𝑄,𝛺).
Theorem 23.1. The kernel of 𝐾LFC — interpreted as the joint conjunction of all coordinate-form
constraints in §19 — is
ker𝐾LFC =
𝛷:
{
∂𝑡𝜌𝐼 +∇⋅(𝜌𝐼∇𝑆𝐼)=0
1/2
𝛹=𝜌𝐼
𝑒𝑖𝑆𝐼/ℏ
𝜓𝐶 =𝑓fractal +∇⋅(𝜌𝐼∇𝑆𝐼)
(𝛥𝑔−6)(𝛥𝑔−30)𝛷=0
𝛿𝑆UMVP =0
̂
ℋ
𝛹=0
𝑄=1, 𝛺=𝛺𝑐, 𝐷=10 }
.
The set coincides set-theoretically with ker𝐾 pulled back through the algebraic-to-LFC dictionary.
23.2 Final identification
ker𝐾=ker𝐾LFC =ker(𝛿𝑆UMVP
̂
𝛿𝛷 )=kerℋ
.
The “consciousness formalism” is the hydrodynamic + fractal + Schrödinger coordinate chart of
ker𝐾. It contains no additional principle.
24. Euler Bridge — Stationarity
The Euler–Lagrange equations for any Lagrangian density ℒ(𝛷,∂𝜇𝛷) are
∂ℒ
∂𝛷
−∂𝜇( ∂ℒ
∂(∂𝜇𝛷))=0.
These coincide with 𝛿𝑆/𝛿𝛷=0, which in the UMVP case is precisely 𝐾UMVP(𝛷)=0, i.e. 𝛷∈
ker𝐾UMVP. Hence
𝐾𝑥=0⇔𝛿𝑆=0⇔Euler–Lagrange closure.25. Planck Bridge — Phase Quantisation
1/2
The Madelung representation 𝛹=𝜌𝐼
𝑒𝑖𝑆𝐼/ℏ realises the continuity equation through the
Schrödinger probability current
ℏ
𝐽𝛹 =
Im(𝛹∗∇𝛹)=
𝑚
𝜌𝐼
𝑚
∇𝑆𝐼.
The constant ℏ converts phase gradients into quantum currents. Hence
1/2
𝐾𝑥=0⇔𝛹=𝜌𝐼
𝑒𝑖𝑆𝐼/ℏ ⇔Planck phase quantisation.
26. Bohm Bridge — Quantum Potential
The polar decomposition of the Schrödinger equation produces a Hamilton–Jacobi equation with an
additional curvature-of-amplitude term:
∂𝑡𝑆+|∇𝑆|2
2𝑚
ℏ2
2𝑚
∇2√𝜌𝐼
√𝜌𝐼
.
The Bohm quantum potential 𝑄𝐵 is the curvature term induced by amplitude geometry. In the
kernel framework, it identifies with the curvature-field divergence lift of §9.3:
+𝑉+𝑄𝐵 =0, 𝑄𝐵 :=−
ℏ2
∇2√𝜌𝐼
𝐾𝑥=0⇔𝑄𝐵 =−
⇔Bohm quantum potential closure.
2𝑚
√𝜌𝐼
27. Einstein Bridge — Geometric Closure
From §17,
𝐾𝑥=0⇔(𝛥𝑔−6)(𝛥𝑔−30)𝜙=0⇔𝑔𝜇𝜈 =⟨∂𝜇𝜙,∂𝜈𝜙⟩⇔𝐺𝜇𝜈 +𝛬𝑔𝜇𝜈 =0.
28. Hawking Bridge — Entropy
28.1 Kernel-state entropy
Define the kernel-state Boltzmann entropy
𝑆𝐾 :=𝑘𝐵logdim𝐸47 =𝑘𝐵log47, 𝑆𝑉 :=𝑘𝐵logdim𝑉=𝑘𝐵log125.
The kernel occupancy is the dimensional ratio
𝛺𝑐 =
dim𝐸47
dim𝑉
=
47
125
=𝑒(𝑆𝐾−𝑆𝑉)/𝑘𝐵
.𝑘𝐵𝐴
28.2 Bekenstein–Hawking analogue
The Bekenstein–Hawking entropy of a black hole of horizon area 𝐴 is
𝑆BH =
4ℓ𝑃
2.
In the kernel framework, the corresponding entropy is the logarithm of the dimension of the
admissible subspace,
𝑆𝐾 =𝑘𝐵logdimker𝐾.
The horizon, in this reading, is the boundary of admissibility; horizon admissibility coincides with
kernel admissibility.
28.3 Einstein–Hawking semiclassical bridge
The semiclassical Einstein equation acquires a curvature-of-density term:
𝐺𝜇𝜈 +ℏ2𝐶𝜇𝜈 =8𝜋𝐺 𝑇𝜇𝜈, 𝐶𝜇𝜈 =∇𝐶(𝜌𝐼).
This is the ℏ-correction representing kernel-curvature back-reaction on geometry.
29. The Master Historical Bridge Identity
The five canonical formalisms — Euler, Planck, Bohm, Einstein, Hawking — when read through the
kernel construction, become five mutually equivalent statements of the single algebraic condition
𝐾𝑥=0.
Euler: 𝛿𝑆=0
⇕
1/2
Planck: 𝛹=𝜌𝐼
𝑒𝑖𝑆𝐼/ℏ
⇕
ℏ2
∇2√𝜌𝐼
Bohm: 𝑄𝐵 =−
2𝑚
√𝜌𝐼
⇕
Einstein: 𝐺𝜇𝜈 +𝛬𝑔𝜇𝜈 =0
⇕
Hawking: 𝑆𝐾 =𝑘𝐵logdimker𝐾
⇕𝐾𝑥=0
Master historical bridge: Euler stationarity, Planck phase quantisation, Bohm quantum potential,
Einstein geometric closure, and Hawking–Bekenstein entropy, presented as five coordinate charts of
the single algebraic condition 𝐾𝑥=0.
29.1 What each formalism contributes
The five formalisms are not redundant. Each provides a distinct interpretive content for kernel
admissibility:
• Euler gives stationarity — the variational reading.
• Planck gives phase quantisation — the wavefunction reading.
• Bohm gives hydrodynamic quantum curvature — the amplitude-geometry reading.
• Einstein gives geometric closure — the metric-induction reading.
• Hawking gives entropy interpretation — the dimensional-counting reading.
The single algebraic condition 𝐾𝑥=0 is the common substrate.
29.2 Final compressionadmissible state = stationary = quantised = hydrodynamic = geometric = entropy-counted.
30. Discussion
30.1 Character of the invariance
The Eigenspace Robustness theorem is a structural statement: a single subspace, defined by a one-
line algebraic condition, recurs as the answer in thirteen distinct mathematical and physical
questions. The persistence of 𝐸47 across these domains is a coincidence at the level of the
characterisation, not a derivation of any one domain from another. Each lift — algebraic, geometric,
variational, quantum, gravitational, engineering — retains its own internal structure; what remains
constant is the kernel itself.
30.2 Status of the cosmological constant
Theorem 17.1 produces 𝛬=8𝜋𝐺 as a residual of the trace identity in four dimensions, conditional
on metric induction 𝑔𝜇𝜈 =⟨∂𝜇𝜙,∂𝜈𝜙⟩. The induction prescription is not standard general relativity,
in which the metric is fundamental and matter fields are separate. The theorem should be read as: if
the metric is induced from kernel-admissible scalar fields and the dimension is exactly four, then
the vacuum Einstein equation with 𝛬=8𝜋𝐺 is forced. The empirical value of 𝛬 (≈1.1×10−52 m−2)
is many orders of magnitude smaller than 8𝜋𝐺 in any natural unit system, so the framework’s 𝛬 is
best interpreted as a dimensionless coupling-strength relation rather than the observed
cosmological constant. Reconciling the two requires a separate scaling argument.
30.3 Status of the Hawking bridge
The kernel-state entropy 𝑆𝐾 =𝑘𝐵logdimker𝐾=𝑘𝐵log47 is well-defined as a Boltzmann count. The
identification with the Bekenstein–Hawking horizon entropy 𝑆BH =𝑘𝐵𝐴/(4ℓ𝑃
2) is interpretive, not
derivative. To upgrade the analogy to a derivation one would need a microscopic mapping from
horizon area to kernel dimension, of the kind achieved in string-theoretic and loop-quantum-
gravity counting arguments for specific black-hole sectors. The corpus does not provide this
mapping.
30.4 Numerical match for 𝜴𝒄
The two values 𝛺𝑐 =√𝜆/𝜇≈0.376412 (variational) and 𝛺𝑐 =47/125=0.376 (algebraic) agree to
three decimal places but are not identical. Either the dimensionful parameters (𝜆,𝜇) should be fine-
tuned so that √𝜆/𝜇=47/125 exactly, or a separate scaling argument should reduce the irrational
to the rational in the appropriate limit. This tension is recorded as an open problem.
30.5 Status of the Newton-mean odds bridgeSection 18 establishes a compatibility theorem between the Hamilton–Jacobi flow generated by 𝐾2
and the Newton-mean iteration on the kernel-occupancy odds. As the corpus is careful to record,
this is not a derivation. Whether the odds-Newton flow can be obtained from any operation already
present in the operator layer — the contraction semigroup, a Lindblad dissipator, or a
measurement-feedback composition — is open.
30.6 Status of the ISSR cryptographic assumption
The Recursive Spectral Cryptosystem of §21 rests on the ISSR (Invariant Subspace Search and
Recovery) hardness assumption. Its structural source — Schur’s lemma applied to the diagonal
SU(2) commutant on 𝑉2
⊗3
— is mathematically clean: the public polynomial 𝐾 is invariant under a
𝑈(47)-fiber that the public data cannot resolve. This is a different kind of hardness statement from
LWE, hash, or MQ assumptions. Lattice and hash schemes have been deployed and externally
analysed for decades; ISSR has not. A careful programme of external cryptanalysis is needed before
RSC can be considered standardisation-ready.
Three specific cryptanalytic questions remain open:
1. Reduction or separation from existing hardness assumptions. Is ISSR equivalent to, harder
than, or easier than LWE/SIS, MQ, or hidden-subgroup variants under polynomial-time
reductions?
2. Quantum attack analysis. The argument that ISSR admits no Shor-type or Grover-type
shortcut is structural (no abelian hidden subgroup, no oracle for basis vectors, no noisy-
linear-equation structure). Whether a non-standard quantum algorithm — exploiting
representation-theoretic structure rather than group-theoretic structure — could succeed is
open.
3. Side-channel and physical-attack resilience. The PQSPI ASIC’s substrate-enforcement claims
(analog guard ring, Morse Parity Binder, ERI minimiser) are interpretive layers above the
algebraic primitive; they require independent hardware-security review on physical
instantiations.
30.7 Open problems
1. Derivation of the odds-Newton flow from operator-theoretic primitives.
2. Reconciliation of √𝜆/𝜇 with 47/125.
3. Microscopic counting underlying the Hawking-bridge identification 𝑆𝐾 =𝑘𝐵logdimker𝐾 with
horizon entropy.
4. Empirical magnitude of 𝛬.5. 6. 7. Physical realisation of the metamaterial PGO pipeline as a hardware kernel projector,
including measurement of the convergence rate 1−𝛺𝑐 =78/125 predicted by the
Babylonian closure.
External cryptanalysis of ISSR with respect to standard reductions, quantum attacks, and side-
channel resistance.
Formal security games for RSC (IND-CCA2, EUF-CMA) defined relative to ISSR, and their
reductions.
Appendix A — Multiplicity of 𝑪 on 𝑽𝟐
⊗𝟑
Iterating the Clebsch–Gordan rule from 𝑉2 ⊗𝑉2 ≅𝑉0⊕𝑉1 ⊕𝑉2 ⊕𝑉3⊕𝑉4, then tensoring once
more with 𝑉2, gives the irrep multiplicities and isotypic dimensions:
• 𝑉0: dimension 1, multiplicity 1, total 1.
• 𝑉1: dimension 3, multiplicity 3, total 9.
• 𝑉2: dimension 5, multiplicity 5, total 25.
• 𝑉3: dimension 7, multiplicity 4, total 28.
• 𝑉4: dimension 9, multiplicity 3, total 27.
• 𝑉5: dimension 11, multiplicity 2, total 22.
• 𝑉6: dimension 13, multiplicity 1, total 13.
Sum: 1+9+25+28+27+22+13=125=53, confirming the decomposition. The Casimir
takes value ℓ(ℓ+1) on each 𝑉ℓ, giving the spectrum and multiplicities of §2. The kernel sector 𝜆∈
{6,30} corresponds to ℓ∈{2,5} and has total dimension 25+22=47.
Appendix B — Explicit Computation of 𝑷𝑬
The Lagrange-interpolation projector at eigenvalues {6,30} uses the complementary spectrum
{0,2,12,20,42}:
𝑃𝐸 = ∏ 𝐶−𝜆𝐼
(6−𝜆)(30−𝜆)
.
𝜆∈{0,2,12,20,42}
Denominator: (6)(30)⋅(4)(28)⋅(−6)(18)⋅(−14)(10)⋅(−36)(−12)=180⋅112⋅(−108)⋅
(−140)⋅432=1,317,254,400.
Verification on 𝑉6: each factor evaluates to 1; on 𝑉30 likewise. On any other eigenspace, exactly one
numerator factor vanishes.Appendix C — Madelung–Bohm Derivation
For 𝛹=𝑅𝑒𝑖𝑆/ℏ with 𝑅=𝜌𝐼
1/2
:
∇𝛹=𝑒𝑖𝑆/ℏ(∇𝑅+𝑖 ℏ ⁄ 𝑅∇𝑆),
𝛹∗∇𝛹=𝑅∇𝑅+𝑖 ℏ ⁄ 𝑅2∇𝑆,
Im(𝛹∗∇𝛹)=𝑅2 ℏ ⁄ ∇𝑆=𝜌𝐼 ℏ ⁄ ∇𝑆.
Then 𝐽𝛹 =(ℏ/𝑚) Im(𝛹∗∇𝛹)=(𝜌𝐼/𝑚)∇𝑆, equal to 𝐽𝐼 =𝜌𝐼∇𝑆 when 𝑚=1. Substituting into
∂𝑡|𝛹|2 +∇⋅𝐽𝛹 =0 recovers continuity in (𝜌𝐼,𝑆𝐼) form.
Appendix D — Trace Collapse Calculation
With induced metric 𝑔𝜇𝜈 =⟨∂𝜇𝜙,∂𝜈𝜙⟩ and 𝑔𝛼𝛽𝑔𝛼𝛽=dim𝑀,
𝑇𝜇𝜈 =𝑔𝜇𝜈−1 2 ⁄ 𝑔𝜇𝜈(dim𝑀).
For dim𝑀=4: 𝑇𝜇𝜈 =−𝑔𝜇𝜈. For dim𝑀=2: 𝑇𝜇𝜈 =0. For dim𝑀=6: 𝑇𝜇𝜈 =−2𝑔𝜇𝜈. Only dim𝑀=4
yields the standard cosmological-constant form.
Appendix E — Babylonian Convergence
For 𝐵=(1−𝛺𝑐)𝐼+𝛺𝑐𝑃𝐸, the decomposition 𝑥=𝑥𝐸 +𝑥⊥ gives
𝐵𝑥=𝑥𝐸 +(1−𝛺𝑐)𝑥⊥,
since 𝑃𝐸𝑥𝐸 =𝑥𝐸 and 𝑃𝐸𝑥⊥ =0. Iterating,
𝐵𝑛𝑥=𝑥𝐸 +(1−𝛺𝑐)𝑛𝑥⊥ →𝑥𝐸.
Convergence is linear with rate 1−𝛺𝑐 =78/125. The operator-norm convergence lim𝐵𝑛 =𝑃𝐸
follows from ∥𝐵𝑛
−𝑃𝐸 ∥=(1−𝛺𝑐)𝑛 on the orthogonal complement.
References
Anderson, P. W. (1958). Absence of diffusion in certain random lattices. Physical Review, 109(5),
1492–1505. https://doi.org/10.1103/PhysRev.109.1492
Babuška, I., & Strouboulis, T. (2001). The finite element method and its reliability. Oxford University
Press.
Bekenstein, J. D. (1973). Black holes and entropy. Physical Review D, 7(8), 2333–2346.
https://doi.org/10.1103/PhysRevD.7.2333Bernstein, D. J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J., & Schwabe, P. (2019). The
SPHINCS+ signature framework. In L. Cavallaro, J. Kinder, X. Wang, & J. Katz (Eds.), Proceedings of the
2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2129–2146). ACM.
https://doi.org/10.1145/3319535.3363229
Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography. Nature, 549(7671), 188–194.
https://doi.org/10.1038/nature23461
Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J. M., Schwabe, P., Seiler, G., & Stehlé,
D. (2018). CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM. In 2018 IEEE European
Symposium on Security and Privacy (EuroS&P) (pp. 353–367). IEEE.
https://doi.org/10.1109/EuroSP.2018.00032
Bohm, D. (1952a). A suggested interpretation of the quantum theory in terms of “hidden” variables.
I. Physical Review, 85(2), 166–179. https://doi.org/10.1103/PhysRev.85.166
Bohm, D. (1952b). A suggested interpretation of the quantum theory in terms of “hidden” variables.
II. Physical Review, 85(2), 180–193. https://doi.org/10.1103/PhysRev.85.180
Bogomolny, E. B. (1976). Stability of classical solutions. Soviet Journal of Nuclear Physics, 24, 449–454.
Carroll, S. M. (2004). Spacetime and geometry: An introduction to general relativity. Addison Wesley.
Casimir, H. B. G. (1931). Über die Konstruktion einer zu den irreduziblen Darstellungen halbeinfacher
kontinuierlicher Gruppen gehörigen Differentialgleichung. Proceedings of the Royal Netherlands
Academy of Arts and Sciences, 34, 844–846.
DeWitt, B. S. (1967). Quantum theory of gravity. I. The canonical theory. Physical Review, 160(5),
1113–1148. https://doi.org/10.1103/PhysRev.160.1113
Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information
Theory, 22(6), 644–654. https://doi.org/10.1109/TIT.1976.1055638
Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., & Stehlé, D. (2018). CRYSTALS-
Dilithium: A lattice-based digital signature scheme. IACR Transactions on Cryptographic Hardware
and Embedded Systems, 2018(1), 238–268. https://doi.org/10.13154/tches.v2018.i1.238-268
Einstein, A. (1915). Die Feldgleichungen der Gravitation. Sitzungsberichte der Preussischen Akademie
der Wissenschaften zu Berlin, 844–847.
Einstein, A. (1917). Kosmologische Betrachtungen zur allgemeinen Relativitätstheorie.
Sitzungsberichte der Preussischen Akademie der Wissenschaften zu Berlin, 142–152.
Euler, L. (1744). Methodus inveniendi lineas curvas maximi minimive proprietate gaudentes. Marcum-
Michaelem Bousquet.
Goldenfeld, N. (1992). Lectures on phase transitions and the renormalization group. Addison-Wesley.Grover, L. K. (1996). A fast quantum mechanical algorithm for database search. In Proceedings of the
Twenty-Eighth Annual ACM Symposium on Theory of Computing (pp. 212–219). ACM.
https://doi.org/10.1145/237814.237866
Halsey, T. C., Jensen, M. H., Kadanoff, L. P., Procaccia, I., & Shraiman, B. I. (1986). Fractal measures and
their singularities: The characterization of strange sets. Physical Review A, 33(2), 1141–1151.
https://doi.org/10.1103/PhysRevA.33.1141
Hall, B. C. (2015). Lie groups, Lie algebras, and representations: An elementary introduction (2nd ed.).
Springer. https://doi.org/10.1007/978-3-319-13467-3
Hawking, S. W. (1975). Particle creation by black holes. Communications in Mathematical Physics,
43(3), 199–220. https://doi.org/10.1007/BF02345020
Holland, P. R. (1993). The quantum theory of motion: An account of the de Broglie–Bohm causal
interpretation of quantum mechanics. Cambridge University Press.
https://doi.org/10.1017/CBO9780511622687
Kato, T. (1995). Perturbation theory for linear operators (2nd ed.). Springer.
https://doi.org/10.1007/978-3-642-66282-9
Lang, S. (2002). Algebra (Rev. 3rd ed.). Springer. https://doi.org/10.1007/978-1-4613-0041-0
Lyubashevsky, V., Peikert, C., & Regev, O. (2010). On ideal lattices and learning with errors over rings.
In H. Gilbert (Ed.), Advances in Cryptology — EUROCRYPT 2010 (pp. 1–23). Springer.
https://doi.org/10.1007/978-3-642-13190-5_1
Madelung, E. (1927). Quantentheorie in hydrodynamischer Form. Zeitschrift für Physik, 40(3–4),
322–326. https://doi.org/10.1007/BF01400372
Mandelbrot, B. B. (1982). The fractal geometry of nature. W. H. Freeman.
Merkle, R. C. (1989). A certified digital signature. In G. Brassard (Ed.), Advances in Cryptology —
CRYPTO ’89 Proceedings (pp. 218–238). Springer. https://doi.org/10.1007/0-387-34805-0_21
Misner, C. W., Thorne, K. S., & Wheeler, J. A. (1973). Gravitation. W. H. Freeman.
National Institute of Standards and Technology. (2024a). Module-lattice-based key-encapsulation
mechanism standard (FIPS 203). U.S. Department of Commerce.
https://doi.org/10.6028/NIST.FIPS.203
National Institute of Standards and Technology. (2024b). Module-lattice-based digital signature
standard (FIPS 204). U.S. Department of Commerce. https://doi.org/10.6028/NIST.FIPS.204
National Institute of Standards and Technology. (2024c). Stateless hash-based digital signature
standard (FIPS 205). U.S. Department of Commerce. https://doi.org/10.6028/NIST.FIPS.205Patarin, J. (1996). Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new
families of asymmetric algorithms. In U. Maurer (Ed.), Advances in Cryptology — EUROCRYPT ’96
(pp. 33–48). Springer. https://doi.org/10.1007/3-540-68339-9_4
Peskin, M. E., & Schroeder, D. V. (1995). An introduction to quantum field theory. Westview Press.
Planck, M. (1900). Zur Theorie des Gesetzes der Energieverteilung im Normalspektrum.
Verhandlungen der Deutschen Physikalischen Gesellschaft, 2, 237–245.
Pöschl, G., & Teller, E. (1933). Bemerkungen zur Quantenmechanik des anharmonischen Oszillators.
Zeitschrift für Physik, 83(3–4), 143–151. https://doi.org/10.1007/BF01331132
Rajaraman, R. (1982). Solitons and instantons: An introduction to solitons and instantons in quantum
field theory. North-Holland.
Reed, M., & Simon, B. (1980). Methods of modern mathematical physics I: Functional analysis (Rev. and
enl. ed.). Academic Press.
Regev, O. (2009). On lattices, learning with errors, random linear codes, and cryptography. Journal of
the ACM, 56(6), Article 34. https://doi.org/10.1145/1568318.1568324
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-
key cryptosystems. Communications of the ACM, 21(2), 120–126.
https://doi.org/10.1145/359340.359342
Schur, I. (1905). Neue Begründung der Theorie der Gruppencharaktere. Sitzungsberichte der
Preussischen Akademie der Wissenschaften zu Berlin, 406–432.
Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a
quantum computer. SIAM Journal on Computing, 26(5), 1484–1509.
https://doi.org/10.1137/S0097539795293172
Skyrme, T. H. R. (1962). A unified field theory of mesons and baryons. Nuclear Physics, 31, 556–569.
https://doi.org/10.1016/0029-5582(62)90775-7
Stoer, J., & Bulirsch, R. (2002). Introduction to numerical analysis (3rd ed.). Springer.
https://doi.org/10.1007/978-0-387-21738-3
Strogatz, S. H. (2015). Nonlinear dynamics and chaos: With applications to physics, biology, chemistry,
and engineering (2nd ed.). Westview Press.
Wald, R. M. (1984). General relativity. University of Chicago Press.
https://doi.org/10.7208/chicago/9780226870373.001.0001
Wheeler, J. A. (1968). Superspace and the nature of quantum geometrodynamics. In C. M. DeWitt & J.
A. Wheeler (Eds.), Battelle rencontres: 1967 lectures in mathematics and physics (pp. 242–307).
Benjamin.Wilson, K. G. (1971). Renormalization group and critical phenomena. I. Renormalization group and
the Kadanoff scaling picture. Physical Review B, 4(9), 3174–3183.
https://doi.org/10.1103/PhysRevB.4.3174
Wilson, K. G. (1975). The renormalization group: Critical phenomena and the Kondo problem.
Reviews of Modern Physics, 47(4), 773–840. https://doi.org/10.1103/RevModPhys.47.773
AIMS Research Institute. (2026a). The principle of eigenspace robustness: A universal invariance of
spectral kernels across functional, variational, and quantum domains [Internal monograph].
AIMS Research Institute. (2026b). Spectral kernel — continuum lift — variational closure —
cosmological constant by first principles [Internal monograph].
AIMS Research Institute. (2026c). First-principles derivation of the Einstein field equations with
cosmological constant via algebraic-variational-geometric closure [Internal monograph].
AIMS Research Institute. (2026d). Liquid fractal consciousness as a domain of spectral kernel
invariance [Internal monograph].
AIMS Research Institute. (2026e). Derivation of 4D observable spacetime via kernel projection and
gradient annihilation [Internal monograph].
AIMS Research Institute. (2026f). Kernel odds and the Newton–mean occupancy flow: Part XIII
[Internal monograph].
AIMS Research Institute. (2026g). Primitive closure and the unified spectral hierarchy: Sections I–XL
[Internal monograph].
AIMS Research Institute. (2026h). The E47 kernel: Parameter-free algebraic closure for post-quantum
cryptography [Internal monograph].