Quantum Defence Scalability


Quantum Computing

The notion of quantum computing has been around since the 1980s. Quantum computers, using computational methods fundamentally different from classical computers, are now emerging from their neonatal state. They exist today. They are demonstrable. And other countries, especially China, are investing very heavily in their development. What motivated the October 24, 2017 congressional hearing on American Leadership in Quantum Technology? Among other concerns, existing private key / public key encryption systems are under threat from the rise of quantum computing. That's our credit cards!


Tech note: A fundamentally different method of encryption is needed to withstand quantum computing's twin attack method -- algorithmic assault on patterns to eliminate paths to wrong answers combined with extremely robust brute force capability.

Extreme Encryption in the current release features a count of vastly beyond 10 to the power 100 (10100) unique keys combined with pattern reduction that blocks identification of paths that might be eliminated.


Quantum computers have a considerable way to go before they can test beyond 10100 keys to get at the original of one file or message.



Extreme Encryption and Marpx Privacy™in their present configuration deal with six bits at a time. If quantum computer hacking were to really take off, it is a straight-forward task to shift our technology to deal with eight or even ten bits at a time. Key counts would rise beyond 101000 or even 1010000 so that the odds can be even more secure for those that are really serious about privacy.


And if that is not enough, we can combine it with another of our inventions, Pryvit. That combination amounts to scalability plus, privacy plus, probably for the lifespan of this universe and beyond. Nobody can prove that last statement, but don't expect it to be disproved any time soon.


MarpX Privacy