Post-Quantum Encryption

Bi-Symmetric Encryption is a post-quantum encryption API toolset that is designed to be immune to iteration based brute force attacks whether they are executed by a standard computer, supercomputer or quantum computer.  Bi-Symmetric Encryption is a hybridized asymmetric/symmetric handshake system used to safely transmit and exchange public/private keys.  We have also developed our CEW database encryption system.  Together both encryption systems can be used for multiple encryption needs such as, but not limited to internet data transfers, online credit card purchasing and online banking (without transmitting the bank card or credit card data), remote keyless systems for vehicles, UAVs and IoT devices. What sets our encryption apart from all others is that our handshake can login with passwords, credit card or banking data, IoT command instructions, database query instructions, and other confidential credentials without actually transmitting this data directly while only transmitting 100% salted randomized encrypted data.

To claim of quantum computer resilience is​ a significant accomplishment for any encryption algorithm.  The following table breaks down the computational summaries for any type of computer which may brute force attacking (BFA) the Bi-Symmetric handshake and CEW database  encryption algorithms.  The table shows the minimum and maximum handshake sizes being 40 and 256 characters, English text characters usually being equal to a byte in size.  Several rows show timing results for different types of computers (the TaihuLight supper computer several estimates for different types of quantum computers, existing and future) when processing the handshake.   The processing time results on a standard medium level computer for encryption are listed as 0.2 milliseconds for 40 characters/bytes and 2.6 milliseconds for 256 characters/bytes.  

The results of the above table show that an attacking quantum computer cannot process data encrypted by the Bi-Symmetric handshake or the CEW Encryption algorithms within a reasonable time span and in most cases, well beyond a human life span.  This is what make Bi-Symmetric encryption quantum computer proof.

Below are five videos that describe different aspects or uses of the software, how the encryption software was designed to be used with different technologies and how the encryption was designed to thwart different types of attacks.  Special proof of concept software programs were written for each of the five videos.  For each video, software programs were written in pairs using TCP/IP internet protocols to communicate with each other and transmit encrypted data.  Two stand alone programs were written, each to demonstrate hacker attacks.

Cyber Security Defense
In-Depth Conference


CEW Systems Canada was invited to speak at a recent cyber security conference held online on December 7th, 2020 as the second set of speakers


Constable Kenrick Bagnall with the E3 Cyber Security Division of the Toronto Police Service was the first speaker and a gave a very informative and educational talk on how corporations and individuals can protect themselves from Cyber threats.


Our presentation in which we give a general high level overview of our encryption software starts at the 53 minute mark. 

Introduction to Bi-Symmetric Encryption


This introductory video describes what is bi-symmetric encryption, how it can be used to make credit card purchases without actually transmitting the credit card data and how it is used to transmit data across the internet.

Bi-Symmetric Remote Keyless System


This video describes how bi-symmetric encryption is ideally suited for encrypting remote keyless systems using remote vehicle access as the example using key fobs and smart watches.  The video also shows how bi-symmetric encryption thwarts sophisticated attacks designed to allow entry to locked vehicles and building security systems

How Bi-Symmetric and CEW Encryption Foil Brute Force Attacks


This video describes how Bi-Symmetric and CEW Encryption foil brute force attacks. Using special demonstration, the video describes how current encryption software such as RSA encryption are susceptible to brute force attacks, how quantum computers are extremely efficient at brute force attacks and why cryptographers are extremely worried.  The demonstration software shows why CEW encryption is different and how and why a brute force attack would result in every possible decrypted value with no way of identifying which is the correct decryption.


How Bi-Symmetric Handles Man-In-The-Middle Attacks


This video describes how Bi-Symmetric encryption handles man-in-the-middle attacks using a real-world example of a user named Alice using the free Wi-Fi in a coffee shop where Malory is waiting to intercept and steel personal data and information. The video shows show how intercepting the bi-symmetric handshake won’t allow an attacker to intercept or decrypt data. The video also shows defenses against username and password theft.


Bi-Symmetric Encryption for the Automotive Industry


This video describes how bi-symmetric encryption can be used to secure and encrypt the automotive industry against hacking attacks and technically advanced vehicle theft organizations.  


This includes how to setup and secure automotive customer/inventory databases and how to safely and securely register installed smart phone and smart watch apps. 


Brute Force Attack Results (Excel Spreadsheet )


To demonstration how bi-symmetric and CEW encryption were designed to thwart brute force attacks, a test program was created which ran an actual brute force attack on a four-letter word. The encrypted result was "êG+Ê".  The unencrypted word will not be shared, that is a challenge left to be tested. The test software generated three sample tables from total possible 4.1x10 to the power of 26.


For clarity of the results and to emphasize the meaning of the results, with the exception of the first row, all rows with numbers, symbols and capital letters have been excluded. CEW encryption has been designed to display every possible letter, number and symbol combination results during brute force attacks. This means that every possible word and sentence result will be displayed for each full pass of the encryption matrix tables. These examples display all possible decrypted values from "zzzz" down through "aaaa". The English language has 5,454 four letter words, all 5,454 words are displayed within these test results. 

Click here to download the excel spreadsheet.

  • Facebook - Black Circle
  • Twitter - Black Circle

© 2023 by IT SERVICES.  Proudly created with