Post-Quantum Encryption

Bi-symmetric and CEW encryption are post-quantum encryption routines that are designed to be brute force attack and therefore quantum computer proof.  Bi-symmetric encryption is a handshake system used to safely transmit and exchange public/private keys for symmetric and asymmetric encryption routines, which was designed as the means by which to safely transmit CEW encryption keys. The CEW encryption routine is a complex symmetric encryption system that can be used for multiple encryption needs such as, but not limited to internet data transfers, online purchasing, online banking, remote keyless systems for vehicles and buildings using smart various smart devices.

Below are five videos that describe different aspects or uses of the software, how the encryption software was designed to be used with different technologies and how the encryption was designed to thwart different types of attacks.  Special proof of concept software programs were written for each of the five videos.  For each video, software programs were written in pairs using TCP/IP internet protocols to communicate with each other and transmit encrypted data.  Two stand alone programs were written, each to demonstrate hacker attacks.

Introduction to Bi-Symmetric Encryption

 

This introductory video describes what is bi-symmetric encryption, how it can be used to make credit card purchases without actually transmitting the credit card data and how it is used to transmit data across the internet.

Bi-Symmetric Remote Keyless System

 

This video describes how bi-symmetric encryption is ideally suited for encrypting remote keyless systems using remote vehicle access as the example using key fobs and smart watches.  The video also shows how bi-symmetric encryption thwarts sophisticated attacks designed to allow entry to locked vehicles and building security systems

Database Encryption using CEW Encryption, the backbone of Bi-Symmetric Encryption

 

This video describes how EW Encryption the backbone routine for the bi-symmetric handshake encryption system is used to encrypt databases. The video uses a banking database driven server and a banking app as examples to describe how CEW encryption can be used to encrypt databases and how data is encrypted for internet transmittal using encryption key sizes that range into the millions.

 

How Bi-Symmetric and CEW Encryption Foil Brute Force Attacks

 

This video describes how Bi-Symmetric and CEW Encryption foil brute force attacks. Using special demonstration, the video describes how current encryption software such as RSA encryption are susceptible to brute force attacks, how quantum computers are extremely efficient at brute force attacks and why cryptographers are extremely worried.  The demonstration software shows why CEW encryption is different and how and why a brute force attack would result in every possible decrypted value with no way of identifying which is the correct decryption.

 

How Bi-Symmetric Handles Man-In-The-Middle Attacks

 

This video describes how Bi-Symmetric encryption handles man-in-the-middle attacks using a real-world example of a user named Alice using the free Wi-Fi in a coffee shop where Malory is waiting to intercept and steel personal data and information. The video shows show how intercepting the bi-symmetric handshake won’t allow an attacker to intercept or decrypt data. The video also shows defenses against username and password theft.

 

Bi-Symmetric Encryption for the Automotive Industry

 

This video describes how bi-symmetric encryption can be used to secure and encrypt the automotive industry against hacking attacks and technically advanced vehicle theft organizations.  

 

This includes how to setup and secure automotive customer/inventory databases and how to safely and securly register installed smart phone and smart watch apps. 

 

  • Facebook - Black Circle
  • Twitter - Black Circle

© 2023 by IT SERVICES.  Proudly created with Wix.com