The algorithm is designed based on the relations shown in the Fig. 2. “3d Pythocrypt” uses a mapping function from the plain text to cipher text (Andrew 2006) based on a polyalphabetic spread mapping (Kahn 1967). The algorithm “3d Pythocrypt” is based entirely on the divergence of the 3dimensional coordinate system. The coordinates of a point P are usually given by a set (x, y, z) denoting a point in the space called Cartesian coordinates. These also correspond to the same point using another set of parameters (r, θ, Φ) called the polar coordinates. In the first set, the values of x, y, z are the corresponding coordinates, where as in the second, the values r, θ, and Φ correspond to the radius, xy planar angle and yz planar angle of one point of a sphere having the origin O (0, 0, 0) of the coordinate space in focus, as centre.
The algorithm can be broadly divided into 3 phases.

The Encryption phase: Here the plain text i.e. the information is read as byte stream. One set of 3 chunks having 2 bytes each is mapped onto a sphere base using the 3D coordinate system.

The Key generation phase: Here the destination set, i.e. the parameters defining the sphere are obtained and separated into two subsets.
The sphere’s base is combined with one of the subsets and stored as cipher text. The other subset forms the Decryption key.

The Decryption phase: The cipher text and the key are parsed to separate the Sphere base and the definition parameters.
The actual byte sets are obtained by individually operating the sphere base with the necessary parameters. During this process, each set of 6 bytes (48 bits) of plain text generates 8 bytes (64 bits) of cipher text and key and it has a minimal bloating up of the file which means, lower network transit time (Andrew 2006), Computation Time (CPU time in term of clock cycles) and Optimization of routing Algorithms (Andrew 2006).
The encryption phase
The design of the algorithm uses the interconvertibility from Cartesian to Polar Coordinates. It is necessary to have at least four of these parameters (Niven and Zuckerman 1972) to evaluate the other four. That is a condition, which can exist only if the four available parameters are independent. Otherwise a subset having five parameters is the minimum requirement for the complete set to emerge.
The algorithm “3d Pythocrypt” utilizes this to and fro conversion for encrypting and decrypting data.
The plain text is read in sequences of 16 bits (2 bytes) each using a simple parser. 3 such sequences form a block of plain text. This set forms the x, y, z coordinates of a point P on a sphere of radius R given by the equation shown in the Fig. 2. As
$$ \mathrm{R}=\sqrt{\left({\mathrm{OX}}^2+{\mathrm{OY}}^2+{\mathrm{OZ}}^2\right)} $$
(1)
R is a large number in the format ccccccc.eeeeeee. R is floored (rounded down) to get only ccccccc. This forms C (Cipher text Parameter 1). The number of digits (n) in eeeeeee is counted. C is subtracted from R to get 0.eeeeeee, which is then multiplied with 10^{n} to obtain eeeeeee as another integer. This forms E (cipher text parameter 2).
The planar radii OA and OB form the parameters A and B respectively.
Then the supporting parameters θ and Φ are obtained using arccosine functions on A, B and R as shown in Fig. 2.
The key generation phase
The parameters obtained in previous section are separated and put into two files having type suggested by the user (Meyer and Matyas 1982; Bruce et al. 1995). These form the cipher text and the key. The key generated after the encryption is complete and does not play any role in the process of encryption. This is the most important characteristic of “3d Pythocrypt”.
The separation is done as C, E and OA go to the cipher text file and OB, θ and Φ go to the key file. Each of these parameters is 16 bits long and hence the size change from N bytes in the plain text to 4 N/3 in the cipher text. The generated key also has the same length as that of the cipher text.
The decryption phase
In this phase, the cipher text and the key text are combined to bring back the original plain text (Sinkov 1966). However, unlike the existing standard algorithms the decryption process in “3d Pythocrypt” is not a mirror of the encryption process. This is again, a unique characteristic of “3d Pythocrypt” which is explained as follows.
Once both the files are received, C, E, OA, OB, θ and Φ are read from Cipher and Key files using the previously agreed length (16 bits). C is added with E/10^{n} to obtain R. Then using the following operations OX, OY and OZ are obtained.
$$ \mathrm{O}\mathrm{Y}=\sqrt{\left({\mathrm{R}}^2{\mathrm{OA}}^2\right)},\mathrm{O}\mathrm{X}=\mathrm{RTan}\left(\uptheta \right),\mathrm{O}\mathrm{Z}=\mathrm{Rtan}\left(\varPhi \right) $$
(2)
The numbers (OX, OY and OZ) are written into a file which forms the decrypted plain text file. Since the decryption process uses a separate set of operations compared to encryption unlike existing algorithms, this asymmetry of process is a unique feature.