Our new and novel encryption offers a suite of advantages:
Operating in the new age of cyber threats.
Today, more than ever, cyber threats have become an everyday threat, to every corporation, every manufactured product, whether it’s programmable electronic hardware or software. No company is off limits to bad actors looking to make a score.
Unique encryption needs for IoT and Remote Keyless Systems
With today’s wireless electronics systems, new types of encryption are needed to counter the various attacks bad actors have created over the years. New types of attacks now exist, brute force attacks were only the first; relay and rolljam are the most current used to hijack and steal vehicles. Our current worry with autonomouse vehicles is, not so much about what Hollywood has recently imangined, but what happens when your self driving car gets hacked with ransomware?
Money isn’t always the motivator
While most cyber attacks are based on finding a quick profit, joy riding, pranks and revenge are more and more common. In December 2020, the FBI released a public server announcement warming the public about “Swatting” attacks wherein vulnerable smart devices were hijacked to carry out prank 911 emergency calls, recorded and live broadcast using the victim’s voice and camera devices. Sometimes with deadly consequences.
With the publication of the Chinese “Jiuzhang” photonic quantum computer in December of 2020, the long thought of threat became suddenly all too real, too soon. While Quantum computers may never be used to steal individual automobiles, they most certainly will be used to attempt to steal government owned Autonomous vehicles. They will also certainly be used to break into manufacture’s databases with any number of ill intentions.
What is Bi-Symmetric Encryption?
Bi-Symmetric Encryption is a proprietary hybridized asymmetric/symmetric encryption system which uses a unique and novel encryption approach, allowing for the smallest handshake to exchange the largest set of encryption keys between two or more electronic devices. Bi-Symmetric Encryption offers the ability to provide a handshake to securely exchange keys as well as, simultaneously confirm login requests or exchange command codes without directly transmitting the confidential data or command codes. Bi-Symmetric Encryption, uses novel circular ciphers and exponentially nesting encryption to produce the highest encryption key sizes.
Designed for Originally for Encrypting Radio Transmissions
Bi-Symmetric Encryption was designed originally and specifically for wireless devices. In an environment where radio transmission that can and will be easily intercepted, a new and novel encryption handshake approach was created.
100% Salted Command Instructions
Through the use of challenge and counter challenge codes built into the Bi-Symmetric Encryption handshake, user login confidential information and command instructions can be confirmed using 100% randomly generated salted data, while ensuring that a listening device will never be able to override or reuse even a single recorded transmission to gain unwanted access.
Additional features include:
Built-In Password Manager
For smart device controlled IoT devices, a Built-in password manager that converts user’s often week and repetitive passwords to unique values that range from 64 or 128 digits in length. Each password is unique to not just the computers and smart phones and smart watches, but also to each software program and smart device app.
Through the use of the 100% salted randomized challenge and counter challenge code, remote login or VPN login with the use of the password manager allows a user to login to a device or remote server without actually having to transmit their login credentials or command instructions directly.
Preliminary Timing Results
The commercial grade handshake was evaluated on a computer running at 2.7 GHz, while processing 336 bit encryption keys on Windows 10 Home. The table below shows the time it takes to process the public/private keys, not including transmittal time. (cycles) is defined as how many computer cycles were needed to process the data. Divide the cycles by the speed of a device to calculate processing time. For comparison, the competition range listed are values published on Github (https://github.com/mupq/pqm4/blob/master/benchmarks.md)