Venona project (1943–80)
I have read that this was one of the most successful counter-intelligence efforts of the Cold War; purportedly successful because individual(s) on the soviet side began to reuse keys, rather than generating a new key for each message.
These two paths from our collective HISTORY converge with CORA, and become THE FUTURE of data security.
CORA stands for Context Ordered Replacement Algorithm.
Context Ordered infers that the same CORA bloc (key in the Venona project cited above) will always be created anew when 'CORAfying' data.
Replacement Algorithm infers that each CORA bloc's relevant data (perfect encryption cited above) should span a proportionate size that exceeds the relative data.
CORAfied - at its worst:
- 3 CORA blocs in the solution.
- 2 out of the 3 blocs are stolen.
- The blocs are at the minimum size required for CORAfication.
- The hacker has:
- the catalog file.
- the chaos maps.
- The thief knows:
- there are only 3 blocs in the solution.
- the size of the 3rd bloc.
- the relevant order of blocs including boundary conditions.
I prefer to refer to this as "astronomically stronger" or "unbreakable"!
Addendum (4 Dec 2016)
The enormity of this number is still astronomical → unbreakable