National Security


Theft of Our Data

It's pretty easy to put together a litany of instances in which the national security of the United States has been compromised by hackers, many of them nation-state sponsored.

In all of the above, U.S. government information was the primary target.


China routinely steals U.S. technology, either by hacking or by opening the vast Chinese market to firms in return for "voluntary" transfer of corporate secrets. Theft from our high tech companies erodes our nation's competitive edge, and therefore constitutes a national security problem.


MarpX Privacy™ for Government -- Routine Level

The government program has two levels, the first for routine administration. It looks exactly like Level Three of the citizens' program, but it treats upper and lower case letters as different from one another. 'K' and 'k' are not the same. The user selects seven characters for a key, but there are 62 ways to choose each character -- any of the ten digits, any of the 26 capital letters, any of the 26 lower case letters. That's a small change that makes a big difference. 62 X 62 X 62 X 62 X 62 X 62 X 62 amounts to 3.5 trillion possible unique keys. Nobody is going to guess the key for any specific computer file or message in any hurry. It's certainly strong enough for routine government needs.


A bonus: A government employee can correspond or exchange files with anybody who has the regular MarpX Privacy™ program. He or she has simply to use a key suitable to the other person's Level -- seven alphanumeric (Level Three), seven digits (Level Two), or 3 digits followed by the four digit year for anyone using the free Level One.


MarpX Privacy for Government -- One Time Keys for Extreme Encryption

Extreme Encryption was described in the November 2017 patent application as "a method and system of synchronous encryption to render computer files and messages impervious to pattern recognition and brute force attacks". Technically, you could think of it as a Strong Key Iterative Pattern Suppression (SKIPS) encryption method. It is designed to ensure the greatest possible privacy for our national data. The design brings to fruition seven goals listed on the home page. Here they are again:

  1. Destroy all meaningful patterns in data.
  2. Resist brute force attacks. Make attacks difficult with Marpx Privacy™ products, render brute force attacks impossible ("computationally infeasible") with Extreme Encryption.
  3. Blindfold the hacker.
  4. Maximize efficiency of encryption and decryption.
  5. Add research capability (search and text data mining) to encrypted content.
  6. Achieve full scalability in the light of the quantum computing threat.
  7. Be socially responsible. Balance the needs of privacy and national security.


What is meant by one time key? Extreme Encryption has the possibility of more unique keys than there are particles in the universe. Marpex Inc. delivers securely to government customers one time keys which are intended to be used once only to encrypt and later once to decrypt. After their use, these one time keys are discarded! We strongly recommend additional procedures to keep each document or message utterly secure. For example, the encryption and decryption steps should be carried out on computers that are never attached to the Internet. This adds a bit of inconvenience (carrying a file on a flash drive to and from the designated computer). But the security gain is outstanding. When all procedures are properly followed, hackers and eavesdroppers do not stand a chance.


As a matter of social responsibility Marpex Inc. chooses to make Extreme Encryption available only to U.S. government agencies and to organizations either sponsored by a government agency or carrying out contracts on the government's behalf.


MarpX Privacy