C-ELP · Contextual Emoji Linguistic Protocol
Text becomes emoji.
Meaning stays hidden.
C-ELP maps words to emoji through semantic groups, then rotates the mapping with configurable ciphers — from simple substitution to time-locked hierarchical encryption. The output looks like a string of emoji. The content is unreadable without the key.
How it looks
Plaintext in. Emoji out.
Same meaning, completely opaque.
Plaintext
The server credentials are in the vault. Access expires at midnight.
C-ELP encoded
composite mode🏛️🖥️📜🔑✉️🏰🔒📦🚪⏳🕛🌙
Decoded with key
verifiedThe server credentials are in the vault. Access expires at midnight.
Each word maps to a semantic emoji group. The cipher rotates which emoji represents which concept. Without the rotation key, the emoji sequence is meaningless.
How C-ELP works
Every word in a language belongs to a semantic group — words about time, about places, about actions. C-ELP assigns each group a set of emoji, then rotates the assignment using a cipher.
1
Semantic mapping
Words are classified into semantic groups (emotions, objects, actions, time, etc.). Each group has a pool of emoji that can represent it.
2
Rotation cipher
A cipher key rotates which emoji from the pool represents which word. Different modes apply rotation differently — by position, by key, by time.
3
Output
The result is a sequence of emoji that encodes the original meaning. To decode, apply the same cipher in reverse. Without the key, it's just emoji.
Five cipher modes
From casual obfuscation to military-grade encryption
Fixed mapping — every word always encodes to the same emoji. Good for obfuscation, not for security. Same input always produces the same output.
The emoji assigned to a word changes based on its position in the message. The same word at position 1 and position 5 will encode to different emoji.
A secret key determines the rotation. The same message encoded with different keys produces completely different emoji sequences. Decoder needs the same key.
Combines key rotation and position rotation. Each word's emoji depends on both the secret key and its position in the message. Significantly harder to break via frequency analysis.
Time-locked encoding. The mapping rotates based on the current time period. A message encoded at 14:00 cannot be decoded at 15:00 unless the time parameter is included. Combine with key mode for time + key dependent rotation.
Aegis — Hierarchical Encryption
For messages that need real cryptographic protection on top of semantic encoding. Aegis wraps C-ELP output in a multi-layer encryption hierarchy — think of it as an encrypted envelope around the emoji sequence.
Multi-layer encryption
Message is encrypted at multiple hierarchical levels. Each layer adds an independent encryption pass. Compromising one layer does not reveal the content.
Group-scoped access
Different recipients can be granted access at different hierarchy levels. A team lead might decrypt the full message while a team member sees only their portion.
Forward secrecy
Keys can be rotated per-session. Past messages remain secure even if a current key is compromised.
Composable with C-ELP
Use C-ELP encoding first for semantic obfuscation, then wrap the result in Aegis for cryptographic security. Two independent layers of protection.
API
Seven endpoints. One credit per call.
/api/v1/celp/encode Encode plaintext to emoji using a cipher mode
/api/v1/celp/decode Decode emoji sequence back to plaintext
/api/v1/celp/encrypt Encode + encrypt with key-based cipher
/api/v1/celp/decrypt Decrypt + decode a key-encrypted message
/api/v1/celp/groups List available semantic emoji groups
/api/v1/celp/aegis/encrypt Aegis hierarchical encrypt over C-ELP
/api/v1/celp/aegis/decrypt Aegis hierarchical decrypt
All endpoints require authentication via session cookie or API key. 1 credit per API call. Subscribers on Pro or Unlimited have unlimited access.
Quick start
Three lines to encode
# Encode text with key-based cipher
curl -X POST https://voidnote.net/api/v1/celp/encrypt \
-H "Cookie: session=YOUR_SESSION" \
-H "Content-Type: application/json" \
-d '{
"text": "The deployment key is rotated daily",
"key": "my-secret-key",
"mode": "composite"
}'
# Response
{
"encoded": "🏗️🔑🔄📅🔒🛡️⚙️🌐",
"mode": "composite",
"groups_used": 6
}
# Decode it back
curl -X POST https://voidnote.net/api/v1/celp/decrypt \
-H "Cookie: session=YOUR_SESSION" \
-H "Content-Type: application/json" \
-d '{
"encoded": "🏗️🔑🔄📅🔒🛡️⚙️🌐",
"key": "my-secret-key",
"mode": "composite"
}' Works with any HTTP client. Same API, any language. Full API documentation →
What people use C-ELP for
Steganographic messaging
Hide real messages in plain sight. To an observer, it's just a string of emoji in a chat.
Data obfuscation
Store or transmit data in a format that's not immediately recognizable as structured content.
Access-controlled comms
Use Aegis layers to give different recipients different decryption levels.
Ephemeral encoding
Chronos mode makes messages time-locked — undecodable after the time window closes.
Two-layer security
Combine C-ELP with VoidNote: semantic encoding + zero-knowledge self-destructing delivery.
Creative & artistic
Translate poetry, lyrics, or stories into pure emoji — a new form of encoded expression.
Start encoding
Register for a VoidNote account. You get 10 free credits per week — each credit covers one C-ELP API call.