Switzerland

Back to Search

International Partner Search

Innovation & Technology Offer

Non-mathematical and quantum-proof data cryptography method using randomness

Country of Origin: Germany
Reference Number: TODE20210505003
Publication Date: 5 May 2021

Summary

A German IT developer has developed a quantum-safe data encryption method. It is non-mathematical, random-based and has just been patented. Its innovative character lies in proving that randomly encrypted data can be decrypted after all. The company looks for partners from the IT sector, preferably with a link to IT security, for licence agreements or technical cooperation agreements to further improve the technology.

Description

The controversial backdoor access for national security services is already a serious threat to IT security. Sooner than predicted, the sheer computing power of quantum computers will also be able to break these mathematically created cipher rates.

A German IT developer has devised a non-mathematical, quantum-safe encryption method using random numbers. The approach is based on the One-Time-Pad (OTP) procedure, previously used to encrypt the "red phone" between the USSR and the USA, the disadvantages of which have been eliminated.

Until now, it was unanimously believed that random numbers could not be used for encryption because there was no way to decrypt the randomized data. The developed solution addresses this problem by using a data key that exchanges, shifts, separates and rearranges bytes.

Innovatively, it is not a mathematical encryption method. The new encryption method encrypts by coincidences. This does not mean the pseudo-randomness in the programming languages, but real randomness, which is derived from the data to be encrypted.

During encryption itself, the procedure randomly selects new OTPs to encrypt the original. Therefore, the amount of data that can be encrypted is unlimited. The use of the single OTP has also been significantly extended. Basically, one byte is replaced by two bytes that are written separately and distributed randomly in the ciphertext. Only after these two bytes have been correctly reassembled and placed at the position where the byte had been located in the original can the encrypted byte be reconverted to the original byte. In contrast to the previously known OPT method, the new method can be used to encrypt not only texts, but any data.

Currently, the encryption method is only used in a software for encrypting files. The German IT developver also sees great potential in cloud applications. However, the method is suitable for all encryption applications, except for the use of public keys, as used in asymmetric encryption methods.

The method is platform independent. A file (or data stream) encrypted on operating system X can then be decrypted on any operating system.

Several routines are built into the encryption method rendering it impossible to crack. Furthermore, it is technically impossible to program a backdoor into the encryption process unless one wants to permanently transmit the generated data keys over the Internet.

Moreover, not a single byte of the original is encrypted with the original data key owned by the user. Instead, first thing the routine will create a new key. It is therefore not possible to deduce the data key from the ciphertext, nor do the data keys used for encryption continue existing, or are likely to ever be generated again, given the large number of possible data keys.

The ciphertext never becomes larger than 250 percent of the original, and the energy savings over blockchain technology are substantial.

If the method is used for encrypting data streams, both the sender and the receiver must of course be in possession of the symmetric data key. This can be generated, for example, by using an Internet text, a song, or a YouTube video.

In any two encryption processes with the same data key, two completely different ciphers will be created from the original, which is then reconverted to the same original again when decrypted. The set of possible keys amounts to a minimum of more than 259 *10 to the power of 157823 variants and can be upscaled at will.

The company is looking for companies in IT and computer science, preferably in IT security, for license agreements or even technical cooperation agreements to further improve the technology.

Research organisations could be suitable partners if they are interested in converting the solution from pure software into hardware.

The necessary know-how will be provided by the German IT-developer.

Advantages and Innovations

- Quantum-proof method that cannot be cracked
- No backdoor access
- Almost universally applicable

Stage Of Development

Available for demonstration

Requested partner

The company is looking for companies in IT and computer science, preferably in IT security, for license agreements or even technical cooperation agreements to further improve the technology. 

Research organisations could be suitable partners if they are interested in converting the solution from pure software into hardware.

The necessary know-how will be provided by the German IT-developer.

Cooperation offer is closed for requests