Discreet Deterministic Chaos Foundation, Not Mathematics!
ShapeShift Value Proposition
Problem: Quantum Computing and Shor’s Algorithm (1994) rapidly identify mathematical periodicity in today’s Public Key Encryption algorithms.
Consequence: Quantum Computing undermines Public Key Encryption and global PKI (Public Key Infrastructure) effectiveness, thereby presenting existential threats to Nation-States, Global Enterprises, and eCommerce.
Requirement: A comprehensive data encryption technology exhibiting NO mathematical periodicity that fortifies and preserves global Public Key Infrastructure (PKI) investments well into the future.
Solution: ShapeShift, a patent pending, new, amorphous data encryption cipher, fortifies existing RSA and PKI operations, immunizing them from Quantum Computing vulnerabilities.
“Hackers Could steal encrypted data now and crack it
with Quantum Computers later, warn analysts!”
Threat Horizon 2023: Four Evolving
Threats That Should Be On Your Radar
ShapeShift implementations can be high-performance, software-only versions. They can also benefit from simple hardware acceleration well-suited to chiplet SoC designs. Because Pseudo-Random Number Generator (PRNG) output directs all ShapeShift operations, ShapeShift does not need but can use decryption keys. Each encryption constructs a unique PRNG, allowing ShapeShift to produce substantially different ciphertext output from two plaintext input files containing identical data.
ShapeShift encryption creates a multi-level plaintext hierarchy. It then independently encrypts the fragments (lowest level elements) using high-performance encryption operations that ensure plaintext bit values can change bit-positions and reverse values multiple times. Significant, unpredictable plaintext byte-fractionation and relocation occur during fragment encryption. Processor-agnostic (X86, ARM, RISC-V, et al.), ShapeShift operations support multi-core parallelism and GPU acceleration and other hardware acceleration options.
ShapeShift reassembles encrypted fragments out-of-order (scrambles) to create associated encrypted elements at the next higher level. Those elements are similarly reassembled out of order, et cetera. Out-of-order reassembly alone adds significant ciphertext complexity. Small, 125 Mbyte files easily result in the number of “(Atoms in the observable universe2648)” different reassembly combinations. Decryption operations simply reverse encryption and scrambling operations.
Wicked fragment encryption significantly increases ciphertext encryption strength and can trade off encryption strength for computational performance, enabling scalability from the Edge to the Cloud.