Monday 25 June 2018

Why is CORA quantum safe?

CORAcsi - quantum safe cryptography

Why is CORA unbreakable?

To unCORAfy (decrypt) data that has been secured with CORA, an attacker/thief must know:

1.       The Multiple Use Pad (MUP) in its entirety:
a.       must know its length. This primary MUP length begins at 150 kB and has no ceiling.
b.       must have "every byte" without exception
2.       The user preferences binary array:
a.       a secondary, specialized MUP (smaller in size, though still far beyond current standards for key lengths).
b.       multiple parameters needed to successfully use the primary MUP cited above.
c.       user preferences and identifiers.
3.       The CORA catalog for a particular solution.
4.       The CORA blocs for a particular solution:
a.       must know how many CORA blocs are involved.
b.       must have each CORA bloc's length.
c.       must have 'each byte' of all CORA blocs.


CORA is probabilistic in nature; it is not factorization based!


Due to the implementation of our MUPs, heuristically based analysis, including those cited in the literature for One Time Pads (see Venona Project), will not reveal the MUP.
Side channel attacks will not work. Factorization based analysis (including Shor and Grover's algorithms) will not work.
The only way to obtain the MUP is by a brute force attack; which cannot be realized due to the size of our MUPs. Quantum computers are expected to reach 1018 calculations/second within 10 years. Should they magically reach 10100 calculations/second, there still wouldn't be enough time - in the life of our universe - to break a 150 kB MUP.

To further protect the MUP, CORAcsi has implemented its own memory manager – to cover the possibility that protected memory might be susceptible to a back door or otherwise unknown attack.

Sunday 10 June 2018

Quantum Safe Cyrptography

CORA - Quantum Safe Encryption
CORA is Quantum Safe Cryptography

CORA is quantum safe cryptography today! CORA empowers unbreakable security for data and communication to protect information, companies, organizations and people.

Abstract



CORA Cyber Security Inc. has pioneered Quantum Safe Cryptography through the use of:
  1. Multiple Use Pads (MUPs). MUPs are similar to a "One Time Pad" (Vernam-cipher or the perfect cipher) except that they are reusable, practical and efficient. 
  2. CORA blocs – a distributed solution akin to Block-chains, without being a "decentralized, peer-to-peer" technology. This means that control over the solution remains securely "in hand".
  3. Block free encryption. Unlike other standards of encryption, the nature of our MUPs is such that there is no limit to the size of one of our keys (MUPs). This further results in the freedom from iterating over a finite, constant and predetermine no of bytes (blocks).
Current standards of encryption can and have been broken, even when properly implemented. When quantum computers arrive in their full glory, current standards of encryption will be rendered useless!

Benchmark

The following benchmarks are based upon the following:
  • an Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz, 3408 Mhz, 4 Core(s), 8 Logical Processor(s).
  • x64-based architecture.
  • CORA's memory manager allocates and uses up to 10 GB of RAM.

Table #1: Results for a 2 GB binary array (times are in seconds)

# of CORA blocs (requested)

4
8
12
CORAfy
6.0
4.7
5.1
unCORAfy
7.4
5.8
6.0
Table #2: Results for a 2.1 GB file including "hard drive" operations (save and read)

# of CORA blocs (requested)

4
8
12
CORA Save (CORAfy and save CORA blocs)
11
10
12
CORA Read (unCORAfy from CORA blocs)
13
12
16

a matter of time