MerlinCryptionhome
Home > Post Quantum Cryptography
 
Post Quantum Cryptography

Encryption cannot stand up to today’s attacks. Two inherent flaws undermine its security:

1.    Lack of Algorithm Complexity.  Today’s encryption algorithms use static processes and repeating behaviors, which are predictable to hackers and make them easier to break.

2.    Risky Encryption Key Management. Competitor’s approach to encryption key exchange, in itself creates security risks. Keys must be transferred between end points. Any stored key is susceptible to theft.

Encrypted data is further compromised by DDoS, Credentials Attack, MiTM, Cross Site Scripting, and Resend or Altered Messaging Attacks. This is further weakened by faster integer factorization.

With the rise of AI and Quantum Computers, these shortcomings are fatal to data

 

POST-QUANTUM CRYPTOGRAPHIC SECURITY

The nondeterministic, and stochastic properties of Anti Statistical Block Encryption (ASBE) algorithm reinforce its ability to secure data against the reasoning, pattern matching, and predictability techniques of Artificial Intelligence.

In addition to these properties, ASBE is not based on mathematical function and has no predictable mathematical relationships, further thwarting any attempt toward the mathematical parallelism, factoring, encoding/decoding, and order-finding capabilities of Quantum Computing.

1.    Algorithm Complexity:  The ASBE algorithm is nondeterministic. All output is stochastic and variable.  It has no static behaviors and exhibits no repeating patterns. The algorithm always produces different cyphertext in every encryption instance, even when using the same key, the same digital signature, and the same plaintext input. No two encryptions are alike

2.    Key Strength & Secure Management: Key generation uses a specific algorithmic technique coupled with its patented Random Data Generator for key generation and management. Keys are created, used, and destroyed on the ENcrypting end. Then recreated, used, and destroyed on the DEcrypting end. There is no key transfer, and no key storage Keys can be any size… from 2008 bits up to 2GB…or any size in between. Keys are layered with variable digital signatures, which scale in length up to 64KB. 

The ASBE algorithm has been government/academically/commercially tested for its security aspects. It is proven to be secure against Statistical Analysis, it is not subject to Mathematical Analysis, and defeats Cryptanalysis and other attacks.