Post-Quantum Encryption

Bi-symmetric and CEW encryption are post-quantum encryption routines that are designed to be brute force attack and therefore quantum computer proof.  Bi-symmetric encryption is a handshake system used to safely transmit and exchange public/private keys for symmetric and asymmetric encryption routines, which was designed as the means by which to safely transmit CEW encryption keys. The CEW encryption routine is a complex symmetric encryption system that can be used for multiple encryption needs such as, but not limited to internet data transfers, online purchasing, online banking, remote keyless systems for vehicles and buildings using smart various smart devices.

Below are five videos that describe different aspects or uses of the software, how the encryption software was designed to be used with different technologies and how the encryption was designed to thwart different types of attacks.  Special proof of concept software programs were written for each of the five videos.  For each video, software programs were written in pairs using TCP/IP internet protocols to communicate with each other and transmit encrypted data.  Two stand alone programs were written, each to demonstrate hacker attacks.

Introduction to Bi-Symmetric Encryption


This introductory video describes what is bi-symmetric encryption, how it can be used to make credit card purchases without actually transmitting the credit card data and how it is used to transmit data across the internet.

Bi-Symmetric Remote Keyless System


This video describes how bi-symmetric encryption is ideally suited for encrypting remote keyless systems using remote vehicle access as the example using key fobs and smart watches.  The video also shows how bi-symmetric encryption thwarts sophisticated attacks designed to allow entry to locked vehicles and building security systems

Database Encryption using CEW Encryption, the backbone of Bi-Symmetric Encryption


This video describes how EW Encryption the backbone routine for the bi-symmetric handshake encryption system is used to encrypt databases. The video uses a banking database driven server and a banking app as examples to describe how CEW encryption can be used to encrypt databases and how data is encrypted for internet transmittal using encryption key sizes that range into the millions.


How Bi-Symmetric and CEW Encryption Foil Brute Force Attacks


This video describes how Bi-Symmetric and CEW Encryption foil brute force attacks. Using special demonstration, the video describes how current encryption software such as RSA encryption are susceptible to brute force attacks, how quantum computers are extremely efficient at brute force attacks and why cryptographers are extremely worried.  The demonstration software shows why CEW encryption is different and how and why a brute force attack would result in every possible decrypted value with no way of identifying which is the correct decryption.


How Bi-Symmetric Handles Man-In-The-Middle Attacks


This video describes how Bi-Symmetric encryption handles man-in-the-middle attacks using a real-world example of a user named Alice using the free Wi-Fi in a coffee shop where Malory is waiting to intercept and steel personal data and information. The video shows show how intercepting the bi-symmetric handshake won’t allow an attacker to intercept or decrypt data. The video also shows defenses against username and password theft.


Bi-Symmetric Encryption for the Automotive Industry


This video describes how bi-symmetric encryption can be used to secure and encrypt the automotive industry against hacking attacks and technically advanced vehicle theft organizations.  


This includes how to setup and secure automotive customer/inventory databases and how to safely and securely register installed smart phone and smart watch apps. 


Brute Force Attack Results (Excel Spreadsheet )


To demonstration how bi-symmetric and CEW encryption were designed to thwart brute force attacks, a test program was created which ran an actual brute force attack on a four-letter word. The encrypted result was "êG+Ê".  The unencrypted word will not be shared, that is a challenge left to be tested. The test software generated three sample tables from total possible 4.1x10 to the power of 26.


For clarity of the results and to emphasize the meaning of the results, with the exception of the first row, all rows with numbers, symbols and capital letters have been excluded. CEW encryption has been designed to display every possible letter, number and symbol combination results during brute force attacks. This means that every possible word and sentence result will be displayed for each full pass of the encryption matrix tables. These examples display all possible decrypted values from "zzzz" down through "aaaa". The English language has 5,454 four letter words, all 5,454 words are displayed within these test results. 

Click here to download the excel spreadsheet.

  • Facebook - Black Circle
  • Twitter - Black Circle

© 2023 by IT SERVICES.  Proudly created with