The cybersecurity inventions by Marpex Inc. are intended as middleware to be included within the products of other firms, to improve their efficiency and security. So that end users and software providers may experience the effectiveness of our inventions, we offer MarpX Privacy, a Windows program that directly protects your files and messages. It features:
- A design to enhance your dignity
- A design that is public
- Automated keys
- High speed
- A design to frustrate hackers
- A design to upset totalitarian regimes
- Free -- the trillion key version requires NO money from you
- Extreme encryption add-ons (not quite free)
- Respect for U.S. national security needs
- A design that is scalable and quantum resistant
- Middleware -- An invitation to collaborate in other apps
You are in control. If some firm wants to encrypt your stuff to "guard your privacy", the question to ask is: "Who has the keys?" With MarpX Privacy, no-one else has the keys; no-one else can mine your information before they encrypt your content. Judeo-Christian faith over thousands of years has upheld a basic idea: the dignity of every person. Privacy is a part of that dignity. We at Marpex Inc. of Steubenville, Ohio are intent on that basic human right; we make sure that not even our firm has any access to your information.
The method underlying MarpX Privacy and Extreme Encryption was first published by the U.S. Patent and Trademark Office in May, 2019. We followed up with a book that explains them, together with a chapter on a later technology, Automated Keys. Except for the technical appendices, Full Speed Ahead and Damn the Qubits: How Marpx Extreme Encryption Works is fairly readable, provided you stayed awake in your high school math classes. The current edition was released on September 4, 2019 at Amazon.com. It is popularly priced at $9.95 U.S. for the ebook and $15.95 for the print version.
Coming up with a new key for every file or message that you create is a bother. Add to that these tasks: record the key, keep it safe, securely transmit it to other persons who are intended recipients, and assure that their use is correct and safe. These combine to make "symmetric key management" so annoying that people in cybersecurity are hesitant to impose it upon lay people. As a result, encryption is left to the experts who will make your content private for you. In other words, you lose control.
In Full Speed Ahead..., Chapter 4 No Keys Please explains our solution to the age-old problem of symmetric key management. And it is fully built into the current release of MarpX Privacy software. It takes well under a minute to add a new confidant to your list of people with whom you want to securely exchange information. After that, forget all about keys, for years if you wish.
Try it! You will enjoy the simplicity and convenience.
Conventional modern cryptography makes heavy demands on computing power, especially in comparison with symmetric key methods. The underlying method in MarpX Privacy is one of bit shifting and bit swapping, processes which are guided by lengthy randomized sequences. These are inherently quick operations. Net effect: MarpX Privacy is fast.
MarpX Privacy uses combinations of seven characters in a row for your personal ID code and for the authentication code for each confidant in your list of people with whom you want to exchange information privately. Behind the scenes, it also uses seven character sequences as pseudo-keys that point in turn to much larger real keys that guide encryption and decryption. In every instance each character may be an upper case letter OR a lower case letter OR a numeric digit. That's 26 + 26 + 10 = 62 different ways of choosing each of the seven characters. How many different combinations might there be? The answer is 62 X 62 X 62 X 62 X 62 X 62 X 62 = 3,521,614,606,208.
If a hacker cannot find short cuts to reduce that number, then in a brute force attack three and a half trillion different possibilities must be tried. At one pseudo-key per second, cracking one message or file would take 111,000 years. And when that is done, the next message or file will take another 111,000 years. If the hacker has lots of computing resources and can try a million pseudo-keys every second, it will still take forty days for each decryption using a great deal of computer resources. That's expensive!
By the way, that's for the free version of MarpX Privacy. With an Extreme Encryption add-on, it takes "somewhat longer".
People of the government, for the government, and by the government has not yet perished from the earth. Surveillance has become a favorite tool of authoritarian regimes; they want to know everything about those opposing them. MarpX Privacy can play a role in countering this. Focused electronic surveillance of individuals will be extremely costly for the regime; MarpX Privacy raises the cost of breaking into people's messages and files so high that surveillance of the general population would no longer be possible. See more on this in Chapter 7 Social Impact in Full Speed Ahead....
Go to https://BuyExtremeEncryption.com, go to the shopping cart to select quantity "1", go to Check Out, register, download. No payment is requested. If you live under a repressive regime and don't want the government learning that you have this software, register as Mickey Mouse. That's okay. But do tell us the correct country. (In the U.S., real information, please!)
Extreme Encryption capability is delivered to U.S. customers only; we are not permitted to export it under U.S. Export Administration Regulations. Sorry! Extreme Encryption is delivered as small files, one for each confidant with whom you wish to exchange information with ultra-secure privacy. (The count of different keys confronting a hacker is a number 623 digits long.)
Make that "paying U.S. customers". You can't have everything for free!
Surveillance of suspect communications is a strongly felt need on the part of every government department and officer responsible for public safety and security.
Privacy of communications is an expectation born of American history. The Declaration of Independence was a call to revolution against "tyranny" and "despotism". Article II of the Constitution, the right to bear arms, is widely interpreted as a defense against government intrusion into the lives of a free citizenry. Surveillance? That subject makes many Americans feel nervous.
The problem at its roots is essentially one of political will. Congress responds to public opinion. But as citizens, each of us is conflicted; our ideal would be privacy for ourselves and effective surveillance for bad guys. In reality, our view is influenced by the latest news cycle. Terrorist atrocity today? Our congressional rep will hear tomorrow that we want better security. Revelation of a previously unreported government surveillance mechanism? Our congressional rep will hear tomorrow that our privacy is not to be messed with. In this teeter-totter public opinion environment, our political leaders are charged to shape solid policy which will provide an effective ongoing balance between privacy and public safety needs.It is a challenge to balance personal needs and our shared needs as citizens of a country. Personal privacy can at times make national security and policing difficult.
[The above three paragraphs are taken from Marpex Inc's earlier privit.com web site.]
MarpX Privacy is strong encryption. The general public version has 3.5 trillion possible keys; that tilts things very much in favor of the privacy end of the spectrum. We believe that Extreme Encryption raises out of sight the challenge to national security and policing. How might some balance be achieved? Our suggestion: That Homeland Security or another appropriate arm of government set up and finance an escrow arrangement for the Extreme Encryption add-on files. We pass blocks of these Private Exchange Tool (PET) files unopened into escrow. Nobody (repeat, nobody) shall have access except on a FISA court order for specific files. For persons and organizations who are unlikely to come under FISA scrutiny, there is no problem. For would-be terrorists, there is a well-deserved problem. With the right PET files in hand, access to their content comes back down to the 3.5 trillion key level, the same as the general public. That's still very secure, but we suspect that the National Security Agency might be able to pour on enough resources to break messages that really matter.
If there is an appropriate U.S. government agency that is interested in this, contact us. Agencies of foreign governments -- forget it!
Incidentally, we destroy our copy of each PET file after the customer acknowledges receipt. No-one can get it from us by any means; we haven't got it. And the escrow arrangement ensures that we can never get it back. These are essential protections for our customers.
Design goal: That the vast count of possible Private Exchange Tools can be scaled up to address any computing strength whatsoever that adversaries may launch against our nation's knowledge resources. In that process of scaling upward, we want to keep the PET structure small and efficient.
Why scalability? Because far more that Moore's Law is at work. The Chinese are at work, investing heavily in quantum computing which, in 2019, is still in its infancy. But it works, and it poses a future threat. Quantum computing is good at recognizing within a huge integer the two primes that are multiplied together to produce it. A worrisome aspect: U.S. investment is falling well behind the Chinese in this field. When quantum computers reach somewhere near 300 qubit strength, the encryption underlying the U.S. financial system and much of our national security will falter.
A Congressional Hearing on Quantum Technology by the House Science, Space and Technology Committee in October 2017 pleaded for tools that anticipate this threat. Our response is a design that will defeat quantum computing; quantum computing gains power exponentially, doubling with each qubit added. In contrast, our design grows ever so much faster. We map each character in an encryption key to a highly randomized binary sequence with special properties that help to obliterate patterns in the encrypted result. These binary sequences can be enlarged indefinitely in the face of advances in quantum computing. The seven character group that we have called a key is really a pseudo-key, a stand-in for the real key, currently 2688 bits, but readily enlarged.
For more on how our encryption meets that need, read Full Speed Ahead and Damn the Qubits: How Marpx Extreme Encryption Works, available at Amazon.
MarpX Privacy is an implementation of "middleware" technology that really belongs embedded as a feature in many other software products to make each product more secure.
Marpex Inc. is a small research firm with three patents and a fourth underway. It has no ambitions of growing into a great marketing presence, and would give serious consideration to a partnership with a view to full sharing of Marpex technologies. Objective: to incorporate Marpx Privacy and Extreme Encryption in apps on a broad range of devices. We are interested in licensing the technology to other firms, and are open to a possible eventual buyout.
We could elaborate at length about the values and perspectives that Marpex Inc. would bring to a joint endeavor. For now, let's sum it up simply as servant marketing ... the customer's needs at the center, service with excellence as the bottom line.
Marpex Inc. brings to the table technology transfer in the form of C++ source code, documentation, contribution to team design, marketing suggestions, and mentoring of software engineers.
What would you bring to the table? If your organization brings integrity, a service orientation, high reputation in the cybersecurity ecosystem, quality marketing and software teams, and resources and experience in relevant markets, let's talk. Contact Stephen Feher at email@example.com or 740 317-4847.