Our new and novel encryption offers a suite of advantages:

Operating in the new age of cyber threats.

Today, more than ever, cyber threats have become an everyday threat, to every corporation, every manufactured product, whether it’s programmable electronic hardware or software.  No company is off limits to bad actors looking to make a score.

Unique encryption needs for IoT and Remote Keyless Systems

With today’s wireless electronics systems, new types of encryption are needed to counter the various attacks bad actors have created over the years. New types of attacks now exist, brute force attacks were only the first; relay and rolljam are the most current used to hijack and steal vehicles.

Money isn’t always the motivator

While most cyber attacks are based on finding a quick profit, joy riding, pranks and revenge are more and more common. In December 2020, the FBI released a public server announcement warming the public about “Swatting” attacks wherein vulnerable smart devices were hijacked to carry out prank 911 emergency calls, recorded and live broadcast using the victim’s voice and camera devices. Sometimes with deadly consequences.

Quantum Computers

With the publication of the Chinese “Jiuzhang” photonic quantum computer in December of 2020, the long thought of threat became suddenly all too real, too soon.   While Quantum computers may never be used to steal individual automobiles, they most certainly will be used to attempt to steal government owned Autonomous vehicles. They will also certainly be used to break into manufacture’s databases with any number of ill intentions.

What is Bi-Symmetric Encryption?

Bi-Symmetric Encryption is a proprietary hybridized asymmetric/symmetric encryption system which uses a unique and novel encryption approach, allowing for the smallest handshake to exchange the largest set of encryption keys between two or more electronic devices. Bi-Symmetric Encryption offers the ability to provide a handshake to securely exchange keys as well as, simultaneously confirm login requests or exchange command codes without directly transmitting the confidential data or command codes.  Bi-Symmetric Encryption, uses novel circular ciphers and exponentially nesting encryption to produce the highest encryption key sizes.

Designed for Originally for Encrypting Radio Transmissions

Bi-Symmetric Encryption was designed originally and specifically for wireless devices.  In an environment where radio transmission that can and will be easily intercepted, a new and novel encryption handshake approach was created.

100% Salted Command Instructions

Through the use of challenge and counter challenge codes built into the Bi-Symmetric Encryption handshake, user login confidential information and command instructions can be confirmed using 100% randomly generated salted data, while ensuring that a listening device will never be able to override or reuse even a single recorded transmission to gain unwanted access.

Expanding encryption key sizes starting at 336-bits

Bi-Symmetric Encryption operates with encryption key sizes starting at 336-bits. Using a built-in circular cipher, 32 bits from every 6 bytes of data is used to encrypt the main keys, which then encrypts the data with the newly encrypted keys.  This ensures that every data packet is encrypted with unique keys, emulating key sizes of at least 14,488 bits. Brute force attacking computers are forced to process a 16 level exponentially nested formula that produces identical encrypted results so astronomically large that the number is at least 352 trillion digits long.

Additional features include:

Built-In Password Manager

For smart device controlled IoT devices, a Built-in password manager that converts user’s often week and repetitive passwords to unique values that range from 168, 256 and up to 1,792 digits in length. Each password is guaranteed unique to not just the computers and smart phones and smart watches, but also to each software program and smart device app.

Remote Login

Through the use of the 100% salted randomized challenge and counter challenge code, remote login or VPN login with the use of the password manager allows a user to login to a device or remote server without actually having to transmit their login credentials or command instructions directly.

Brute Force Attack Proof?

It’s important to note that with the keys being dramatically larger than the data being encrypted, this causes a dramatically large number of possible key combinations which produces results that match the intercepted encrypted data. We call these "false positive duplicate results". The number of false positive results are so astronomically large it exceeds manufacturable data storage limits. For comparison the estimated data storage capacity of the internet is ~10^24 bits.

Preliminary Timing Results

The handshake was evaluated on a computer running at 2.7 GHz, while processing 336 bit encryption keys. The table below shows the time it takes to process the public/private keys, not including transmittal time. (cycles) is defined as how many computer cycles were needed to process the data. Divide the cycles by the speed of a device to calculate processing time. For comparison, the competition range listed are values published on Github (https://github.com/mupq/pqm4/blob/master/benchmarks.md)