Keyless encryption technology

About this project

Our project is about how you can take a new approach to solving information security issues. How can I do without keys when encrypting and decrypting data. How can instantly verify any large amount of information. How can I make a rating system without using a password? How to generate a cipher completely resistant to brute force attack. How to make an alternative blockchain without the problem of its scalability.

This is an ideal solution for the security of IOT devices, when (after a certain time) you need to change the password for accessing the IOT device (for its security) - and the hardware and software part does not allow it. For the same reason, this technology is ideal for signaling car security systems, because this technology is absolutely not afraid of scanning, for the same reason - there is no key, and therefore any new team has no correlation (key) with the command intercepted by the scanner!

We are looking for specialists who will become familiar with the basics of our technology in order to communicate on this topic.

Our Proposal

Need: which problem(s) does your proposal solve?

The problem of hacking information with any kind of cryptanalytic attacks, even brute force attacks, the problem of key leakage due to the human factor, the problem of key theft, storage and distribution of keys, the problem of viruses and spyware of all types and modifications in the network (network security), the problem of preserving the integrity of information , the problem of secure voice communication and the transmission of any information, the problems of the block with retaining all the advantages of the linked list, the problems of high transfer costs with modern encryption methods, etc.

Approach: how does your project solve the problem(s)?

There are many additional materials that reveal incomprehensible elements of our encryption technology.

This encryption technology is only part of a common technology for voice-secret communication with this specification:
- the lowest data transfer rate is sufficient for conversational speech at a speed of 1200 characters per minute = 300 bps;
- the voice of the speaker is not broadcast, the listener himself chooses the voice of his interlocutor = identification of the speakers by voice is not possible;
- there is no possibility to decode the conversation even by a complete code search (Brute-force attack) = keyless coding technology;
- the observer in the middle does not have the opportunity to conclude who transmitted to whom and how much information = all pauses of any length in time are not encrypted "as pauses";
- loss (imperceptibly) of even 1 bit of useful (non-command) information is not possible = absolute confidence in 100% integrity due to the fundamental principles of keyless encryption technology and its own Packet Exchange Protocol;
- absolute impossibility of misinformation or modification = because of the axiomatic foundations of our encryption;
- there is no need to ask again = there is a temporary text archive of the entire conversation;
- Absolutely not possible interference = conversation or occurs with reference quality or does not occur at all.

 

Alternatives: what other alternatives could solve the problem(s)?

The technology is not susceptible to any cryptanalysis (decryption) at its fundamental level of operation, it is absolutely resistant to any attacks, including on the basis of adaptively chosen plaintext, as well as to rough attacks (by going through the ciphercode completely).
  The principle of geometric encryption is a virtual space that does not have a static state, and is used to generate vector links pointing to the location of the internal symbol in it, which is now used as a logical analogue of our input data.
 The generated link carries a semantic load (correctly points to the transmitted data) only at one, conditionally “its own” - time point (the so-called “logical time tunnel”).

Benefits: what are the benefits of your proposal?

No risk of leakage or theft of key information, so-called. “Human factor” is completely absent here, and therefore there is no possibility to decrypt all the cipher codes received earlier, regardless of the technical equipment of the attacking side and the presence of “informants”.

Advantage: what gives your project the competitive edge?

1. Keyless encryption technology - does not exist.
2. The code protected from rough attack - does not exist.
3. Instant verification of any data volume does not exist.
4. A connected block chain without scaling does not exist.
5. There is no technology capable of distinguishing your information
package from someone else's information package (even at the level of 1 bit!).
6. Integrity monitoring, the absence of the possibility of misinformation or modifying
a message at a basic level of encryption functioning - probably does not exist.

We see the option of how to make it all exist and work.

Prospective Partners: what might you expect from prospective project partners?

This technology is needed wherever there is digital technology, from the IoT Internet Things to the security elements of network protocols.

Based on the above-described functionality, the technology can be optimally used:
In control systems of robotics through open communication channels, without the possibility of hacking;
In all communication systems for secret communication or transmission of any information;
For third-party disinformation by securely simulating the exchange of information without the ability to establish who, to whom, how much and what information transmitted;
In vehicle anti-theft systems, without fear that the signal will be intercepted (and decoded) an unlimited number of times and the security system will be hacked;
In network technologies such as "linked list", blockchain, etc. no scaling problem;
In network security systems through the recognition of its digital packet among any number of other packets of information;
For instant verification of all network traffic regardless of its volume;
Fast hash function that allows you to instantly control the integrity of information.