Skip to content
VoidNote

C-ELP · Contextual Emoji Linguistic Protocol

Text becomes emoji.
Meaning stays hidden.

C-ELP maps words to emoji through semantic groups, then rotates the mapping with configurable ciphers — from simple substitution to time-locked hierarchical encryption. The output looks like a string of emoji. The content is unreadable without the key.

How it looks

Plaintext in. Emoji out.
Same meaning, completely opaque.

Plaintext

The server credentials are in the vault. Access expires at midnight.

C-ELP encoded

composite mode

🏛️🖥️📜🔑✉️🏰🔒📦🚪⏳🕛🌙

Decoded with key

verified

The server credentials are in the vault. Access expires at midnight.

Each word maps to a semantic emoji group. The cipher rotates which emoji represents which concept. Without the rotation key, the emoji sequence is meaningless.

How C-ELP works

Every word in a language belongs to a semantic group — words about time, about places, about actions. C-ELP assigns each group a set of emoji, then rotates the assignment using a cipher.

1

Semantic mapping

Words are classified into semantic groups (emotions, objects, actions, time, etc.). Each group has a pool of emoji that can represent it.

2

Rotation cipher

A cipher key rotates which emoji from the pool represents which word. Different modes apply rotation differently — by position, by key, by time.

3

Output

The result is a sequence of emoji that encodes the original meaning. To decode, apply the same cipher in reverse. Without the key, it's just emoji.

Five cipher modes

From casual obfuscation to military-grade encryption

Static simplest

Fixed mapping — every word always encodes to the same emoji. Good for obfuscation, not for security. Same input always produces the same output.

hello → 👋   hello → 👋   (always the same)
Position

The emoji assigned to a word changes based on its position in the message. The same word at position 1 and position 5 will encode to different emoji.

hello at pos 0 → 👋   hello at pos 4 → 🤝
Key recommended

A secret key determines the rotation. The same message encoded with different keys produces completely different emoji sequences. Decoder needs the same key.

key=alpha: hello → 🌟   key=bravo: hello → 🎯
Composite

Combines key rotation and position rotation. Each word's emoji depends on both the secret key and its position in the message. Significantly harder to break via frequency analysis.

rotation = f(key, position) — every word unique
Chronos highest security

Time-locked encoding. The mapping rotates based on the current time period. A message encoded at 14:00 cannot be decoded at 15:00 unless the time parameter is included. Combine with key mode for time + key dependent rotation.

rotation = f(key, position, time) — ephemeral by design

Aegis — Hierarchical Encryption

For messages that need real cryptographic protection on top of semantic encoding. Aegis wraps C-ELP output in a multi-layer encryption hierarchy — think of it as an encrypted envelope around the emoji sequence.

Multi-layer encryption

Message is encrypted at multiple hierarchical levels. Each layer adds an independent encryption pass. Compromising one layer does not reveal the content.

Group-scoped access

Different recipients can be granted access at different hierarchy levels. A team lead might decrypt the full message while a team member sees only their portion.

Forward secrecy

Keys can be rotated per-session. Past messages remain secure even if a current key is compromised.

Composable with C-ELP

Use C-ELP encoding first for semantic obfuscation, then wrap the result in Aegis for cryptographic security. Two independent layers of protection.

API

Seven endpoints. One credit per call.

POST /api/v1/celp/encode

Encode plaintext to emoji using a cipher mode

POST /api/v1/celp/decode

Decode emoji sequence back to plaintext

POST /api/v1/celp/encrypt

Encode + encrypt with key-based cipher

POST /api/v1/celp/decrypt

Decrypt + decode a key-encrypted message

GET /api/v1/celp/groups

List available semantic emoji groups

POST /api/v1/celp/aegis/encrypt

Aegis hierarchical encrypt over C-ELP

POST /api/v1/celp/aegis/decrypt

Aegis hierarchical decrypt

All endpoints require authentication via session cookie or API key. 1 credit per API call. Subscribers on Pro or Unlimited have unlimited access.

Quick start

Three lines to encode

cURL
# Encode text with key-based cipher
curl -X POST https://voidnote.net/api/v1/celp/encrypt \
  -H "Cookie: session=YOUR_SESSION" \
  -H "Content-Type: application/json" \
  -d '{
    "text": "The deployment key is rotated daily",
    "key": "my-secret-key",
    "mode": "composite"
  }'

# Response
{
  "encoded": "🏗️🔑🔄📅🔒🛡️⚙️🌐",
  "mode": "composite",
  "groups_used": 6
}

# Decode it back
curl -X POST https://voidnote.net/api/v1/celp/decrypt \
  -H "Cookie: session=YOUR_SESSION" \
  -H "Content-Type: application/json" \
  -d '{
    "encoded": "🏗️🔑🔄📅🔒🛡️⚙️🌐",
    "key": "my-secret-key",
    "mode": "composite"
  }'

Works with any HTTP client. Same API, any language. Full API documentation →

What people use C-ELP for

Steganographic messaging

Hide real messages in plain sight. To an observer, it's just a string of emoji in a chat.

Data obfuscation

Store or transmit data in a format that's not immediately recognizable as structured content.

Access-controlled comms

Use Aegis layers to give different recipients different decryption levels.

Ephemeral encoding

Chronos mode makes messages time-locked — undecodable after the time window closes.

Two-layer security

Combine C-ELP with VoidNote: semantic encoding + zero-knowledge self-destructing delivery.

Creative & artistic

Translate poetry, lyrics, or stories into pure emoji — a new form of encoded expression.

Start encoding

Register for a VoidNote account. You get 10 free credits per week — each credit covers one C-ELP API call.