EspaƱol
Post-Quantum Encrypter. The PQEncrypter
Computer Security After Quantum Computers
The recent development of Quantum Computers represents a breach in the security of the data protection systems we use, travel through, and store via computing systems.
Our PQEncrypter has been specifically designed to far exceed the capabilities of Quantum Computers in breaking current encryption systems.
It also cannot be defeated by classical computers, as PQEncrypter is completely immune to brute-force attacks nor by modern Cryptanalysis techniques.
Neither of these computer systems are capable of decrypting messages generated by our powerful algorithm.
See the operational features of PQEncrypter
- 2048-bit symmetric cryptographic algorithm.
- It generates a new random key, decipherable by the final recipient, in the encryption of each message, using the OTP technique considered indecipherable.
- The range of possible keys for the algorithm is a huge number containing more than 500 digits.
- Easy to use and intuitive.
- Fast and efficient in the process of encrypting and decrypting files.
- It uses a message integrity and authenticity security procedure capable of detecting alterations in a single bit throughout the encrypted file, regardless of its length.
- Encrypts all types of files. Text, graphics, images, audio, video, databases, PDFs, vectorials, etc.
- Virtually unbreakable by brute-force mechanisms, not even in the essentially theoretical case of testing and verification at 1012
keys per second, which leads to theoretical decryption times beyond the human scale. The same is true for rates of 1015 and 1018 keys per second.
- It is not based on the factorization of large prime numbers, which is mostly used in current encryption systems such as the RSA algorithm,
a mechanism that is easily beaten by Quantum Computers through the application of the well-known Shor's Algorithm.
- It far exceeds the ability of Quantum Computers to break the algorithm.
Neither can it be done through computation with classical computers, whether very high-level computing, through clusters or grouping of computers, or through the use of GPUs.
- It does not use working philosophies, currently under study, such as lattice-type structures or elliptic curves and discrete logarithms, but rather a different method of operation that surpasses the current Post-Quantum Cryptography (PQC) concept, given that it is completely immune to brute force attack, the only possible one, given the continuous changes in its entropy and internal structure throughout each encryption session, together with the huge range of possible keys of the algorithm.
- Available in a +Plus version that features three additional active layers of protection against attack attempts and violations of the message encrypted by the algorithm.
PQEncrypter, is a fully functional and operative Cryptographic Algorithm.
The above features have been verified through exhaustive performance analysis during its development.
< The delicate IT Security due to Quantum Computers
Sign up and you can check PQEncrypter for 10 days or encrypt and download 5 documents of your choice >