Showing posts with label cora. Show all posts
Showing posts with label cora. Show all posts

Monday, 20 February 2017

Unbreakable - 1104

Unbreakable Security

Can you relate to this immense number? Does such an exponent represent an order of magnitude that makes sense?

101104 is how many times stronger CORA is than military grade encryption when considering a brute force attack. Why 1104, instead of 1105, or 1203? Truth be told, because I like 1104; my point being that there is 'no limit' on how large CORA Cyber Security can make this number!

101104 sufficiently demonstrates that, not even 'quantum computers' will be capable of breaking this encryption with a brute force attack... at least not in this century!

Sure, anyone can make such a claim! The question is, can anyone back up such a claim? CORAcsi can backup this claim - TODAY!

While we are making fast inroads into the marketplace, with a beach head that is growing quickly in select industries, such as industrial controls, robotics and manufacturing, my question is this:

Why doesn't a 'bigger player' investigate our claim further so as to take a leadership role in properly securing the global marketplace? CORAcsi is getting there, but every month delayed is costing the global community upwards of $100 B in cyber crime.

Bottom line: if our claim of 101104 times stronger than everything else that is available, is correct, then the entire Industry is already antiquated - so take a chance, a few moments, and lets have a conversation. Perhaps if you need a little more convincing, take a look at Claude Shannon and his definition of 'perfect encryption'.

Friday, 3 February 2017

Physics Rocks – a journey of excellence and bounded perception

Bottom lines are the foundation from which the mind can sing a song of pure joy, creativity and innovation.

Imagination is the invisible ether that connects basic truths with imagined realities. This is the joy that is, or should be, Physics.
Don't misinterpret my meaning; the discipline and beauty of math is certainly the language of Physics, however, language can only glimpse the depth that is contained in the visualizations the reach beyond the confines of expressible truths.
The mind is the ultimate toy chest. Math and Physics are two side to the same coin - the game of patterns.

This has been my journey from Physics to technology. How can someone without an official degree in computer science possibly develop an 'unbreakable data security' technology? Without a doctorate in math – why would anyone believe that CORA (Context Ordered Replacement Algorithm) is actually "a step beyond encryption that is unbreakable"?

Those who have tasted from the fountain of Physics, or who have realized the love of learning that springs forth from the fountain of youth understand this question, and its answer.

Bottom line – try it – you won't break it. Better yet, because of the nature of 'chaos maps', if you do break 'one', it won't be repeatable – so what good is it?

What do you have to lose? Anyone who knows the industry, or follows the media knows that the current state of encryption 'can and is being broken'. Alas I deviate from Physics. The real question you should be asking is: "how can any student of Physics believe in an absolute", such as 'unbreakable'.

Forgive my egress into the convenience of a coined phrase. The public can relate to 'unbreakable' more readily that a number like 101104 times stronger than anything else that is available.
Who wants to think about "chaos maps" and the problems that exists when an expensive (time, human-hours and money) endeavor might accidentally work once, but cannot be repeated?

For those of you who might contemplate the journey from Physics to innovation & technology, take a look at CORA and see if you can break it; think of it as the ultimate puzzle, Sudoku or game of chess.

When you are ready to embrace a step beyond encryption that is at least 101104 times stronger than every other form of encryption, give us a shout and together we can provide proper security for, well anything and everything 'connected'.


Wednesday, 13 July 2016

Homeland security's Report - substantial in context and scope

GOING DARK, GOING FORWARD a primer on the encryption debate.

These 25 pages are enough to make me speechless - with only 3 exceptions:
  1. There is so much happening in cyber security. There are so many opinions, facts, options and directions. WOW! If I think so, I can't imagine who among my friends and associates will actually read this report.
  2. The article posted on engadget.com entitled Homeland Security's big encryption report wasn't fact-checked is another interesting read. Again, so many facts, counter facts, opinions and directions.
    My only thought here is that, I appreciate all that our governments and professionals are doing to safeguard our security, rights, and freedoms.
    The fact that there is accountability and free speech, speaks volumes about those of us who are fortunate to live in a free, safeguarded and educated society.
  3. The first point on page 6 of this report states:
Encryption plays a vital role in modern society, and increasingly widespread use of encryption in digital communications and data management has become a “fact of life.”
In regards to 'data management', sadly encryption has fallen short. The massive loss of more than 400 billion dollars per year is clear evidence of this fact, rather than the opinion.

Sooner or later (and I am betting on sooner) CORA will be recognized as the standard for data security. Unlike encryption, CORA is capable of producing "unbreakable data security".

Soon the CORAcsi Challenge 2016 will be launched to the global community. While this challenge is admittedly 'unfair', it will announce and validate this bold statement about "unbreakable data security". Stay tuned and spread the word.


Tuesday, 14 June 2016

BlockChains and CORA

Allow me to briefly illuminate the similarities, and differences between BlockChains and CORA.
BlockChains are incredibly resilient, and beyond the control of any “one”. This makes BlockChains ideal for online currency, which was the apparent rationale that drove its creation.

CORA on the other hand was originally developed with a single purpose – to provide unbreakable data security – which encryption alone cannot deliver. 

While CORA has surprised us at CORAcsi.com with additional applications, such as securing one’s online, digital footprint, this is a byproduct of its primary mandate – security.

Hence I targeted a “distributed methodology”, but more than “just a distributed methodology”. I insisted upon the following characteristics:


Points B and D above are pivotal to understanding the difference between BlockChains and CORA as a means of securing data and protecting one's online digital footprint.


For online currency, I personally cannot imagine a better technology than BlockChains.
decentralized, peer-to-peer
The BlockChain is a decentralized implementation. Decentralized, peer-to-peer implementations have been around for years - "bitTorrents" that utilize many duplicates: seeds (files) and catalogs (routing tables).
The design of the BlockChain is beautiful; it is persistent, independent and versatile.

Regarding security, decentralized peer-to-peer systems violate requirement “B” above, by removing the requirements that:
  1. The data can be quickly and permanently “shut down”.
  2. The fragments are highly controlled and secured by professionals (not seeded to unknown computes, perhaps even home computers).

CORA must remain “centralized” so that it can be controlled and if necessary, shut down to prevent unauthorized individuals, teams, companies, or countries from viewing data that belongs to another. Moreover, CORA will not place packages (seeds) in multiple locations, nor on personal computers.
As stated in my earlier blog, executables in a BlockChain should make the global community extremely uncomfortable!

Executables violate requirement “D”, namely that each fragment must be inactive. Perhaps sterile is a better word! 
CORA is committed to using packages that inactive and can be shut down permanently if required.

Saturday, 14 May 2016

Encryption – breaking the myth

Why do ostriches bury their heads in the sand?
Does Donald Trump really believe it sensible to build a wall between the US and Mexico?
Will encryption protect our data?
myth_2
Search for the Truth
There are so many myths to muse about! They sound great. Myths are easy to remember. They play well with others – the myth that is.
Ostriches bury their “eggs” in the sand. Just for a moment – it appears to bury its head – when turning the eggs.
ostrich_3
Don't bury your head in a myth
Encryption protects communication. Just for a moment – it appears to protect static data – if no one ever steals it.

Let’s take a closer look.

Have you seen the “Imitation Game”? Even though the Enigma machine was adhering to its truest purpose, protecting communication, Turing broke the encryption - daily.
Think of encryption as a safe. It is a good safe. The locking mechanism is very good – prime numbers. So what’s the problem?
Just like in the “real world”, if someone steals the “entire safe”, they get the contents as well. Once that safe is in their back yard, it is only a matter to time!

What evidence is there that encryption can be broken?

When eBay’s breach occurred back in 2014, their user base, complete with encrypted passwords was stolen. That’s right, encrypted passwords. And what did they say? “Change your passwords”. Why would they warn users to change their passwords when they were encrypted? Isn’t the answer obvious? Those in the industry know the answer!
Encryption can be broken.
Adele’s Photo Hack (like other celebrities) involved combinations of iCloud and email services. Bottom line, encryption can be broken.
The Cloud needs a security service that supersedes encryption.
In simple terms, prime numbers are the keys that lock and unlock encryption. 128-bit encryption versus 256-bit encryption tells us how large these keys are. They are very large. The larger they are, the more difficult it is to find the key. So where’s the problem?
Computers are more powerful every day. Prime number generators exist. Modern computers equipped with prime number generators can do in seconds what it would have taken Turing’s computer, years to compute during the second world war.
What’s the alternative? We need to do something to protect our data in the Cloud.
CORAcsi_avitar
CORA Cyber Security Inc.
The answer is CORA (Context Ordered Replacement Algorithm). Read more about this “unbreakable data security” at http://CORAcsi.com and download your free CORA Explorer at http://CloudCORA.com .

Saturday, 20 February 2016

Kriste formally joins Team CORA

As the formal launch of CORA approaches at Cloud CORA, Kriste officially joins Team CORA at goCORA.com.
I would consider this to be "ironic", since Kriste has been an integral part of CORA for years :)


Monday, 15 February 2016

CORA for dummies

This first post will be a simple one - CORA for dummies (non-techies).
Many friends and associates have asked me to explain CORA in simple terms. While I have done so, rather successfully (in my opinion), it occurred to my wife, that I should produce a simple, post-card size, bulleted summary of CORA for dummies like her, LOL (funny how the most brilliant are OK in joking about being a dummy :) )