Encryption cannot stand up to today’s attacks. Two inherent
flaws undermine its security:
1.
Lack
of Algorithm Complexity. Today’s
encryption algorithms use static processes and repeating behaviors, which are
predictable to hackers and make them easier to break.
2.
Risky
Encryption Key Management. Competitor’s approach to encryption key
exchange, in itself creates security risks. Keys must be transferred between
end points. Any stored key is susceptible to theft.
Encrypted data is further compromised by DDoS, Credentials Attack,
MiTM, Cross Site Scripting, and Resend or Altered Messaging Attacks. This is
further weakened by faster integer factorization.
With the rise of AI and Quantum Computers, these shortcomings are
fatal to data
POST-QUANTUM CRYPTOGRAPHIC SECURITY
The nondeterministic, and stochastic
properties of Anti Statistical Block Encryption (ASBE) algorithm reinforce its
ability to secure data against the reasoning, pattern matching, and predictability techniques of
Artificial Intelligence.
In addition to these properties, ASBE is not based on mathematical function
and has no predictable mathematical relationships, further thwarting any
attempt toward the mathematical parallelism, factoring, encoding/decoding, and
order-finding capabilities of Quantum Computing.
1.
Algorithm
Complexity: The ASBE algorithm is nondeterministic. All
output is stochastic and variable. It
has no static behaviors and exhibits no repeating patterns. The algorithm always
produces different cyphertext in every encryption instance, even when
using the same key, the same digital signature, and the same plaintext input.
No two encryptions are alike
2.
Key
Strength & Secure Management: Key generation uses a specific algorithmic technique coupled with
its patented Random Data Generator for key generation and management. Keys are
created, used, and destroyed on the ENcrypting end. Then recreated, used, and
destroyed on the DEcrypting end. There is no key transfer, and no key storage
Keys can be any size… from 2008
bits up to 2GB…or any size in between. Keys are layered with variable digital
signatures, which scale in length up to 64KB.
The ASBE algorithm has been
government/academically/commercially tested for its security aspects. It is
proven to be secure against Statistical Analysis, it is not subject to
Mathematical Analysis, and defeats Cryptanalysis and other attacks.
|