With automated keys you enter a seeming magical world of cybersecurity, with all the advantages of symmetric key encryption, but none of the pain.
The following six painful problems simply go away:
- Create a new key for every file or message to be made secure;
- record the key;
- keep that key safe from hackers and eavesdroppers;
- securely transmit the key to other persons who are intended recipients of your files and messages;
- ensure that the recipients' use of the keys is in turn correct and safe; and
- arrange that keys are destroyed in a timely manner.
You will experience our solution to these six problems as keyless privacy / keyless encryption. Actually, it is automated selection of keys that are invisible to everyone. Let's outline the basics and consider how you may use it. If you want detail on how it works, read Chapter 4 of Full Speed Ahead and Damn the Qubits!: How Marpx Extreme Encryption Works, available at Amazon -- $9.99 for the ebook, $15.99 for print.
- A person -- you
- A concern -- privacy, security
- A program -- MarpX Privacy
- A personal identifier code
- Other persons -- friends, colleagues
- Persons become confidants
- A roster of confidants
- Little pseudo-keys, massive real keys
- Time-sensitive keys
- Optional Extreme Encryption
- Full Quantum-Proof Security
- Encrypt something -- utter simplicity
- Decrypt something -- utter simplicity
- Hackers undone
A person -- you
The bottom line is ultimately people, people well served. Servant marketing may be a new idea to you -- putting people first, before money, before power, before other motives. We want you to be a person well served by our offerings.
You have two roles in the notes below. You will be a user of some privacy software. You will also be a confidant of others with whom you want to share ideas, messages, files, communications -- shared in ways so that other people may not intrude.
A concern -- privacy, security
People matter. The dignity of every human person matters. (Life would be more pleasant for all of us if more people bought into universal human dignity.) Privacy is essential to human dignity. We want to share and have a voice when we want to be heard. But when there is no privacy, people grab things out of context, they get things wrong, they mistake our motives, and they make us look bad. That's all on top of concern about vulnerability to competitors and to enemies.
A program -- MarpX Privacy
Our offering is a program, MarpX Privacy, to introduce you to our patented technology. It's free, available for download around the world. Get it at https://buyextremeencryption.com.
It enables you to make messages and computer files of any description secure. It has the look and feel of web pages. This page that you are reading is one of the growing list of helps included with the program.
By the way, our technology can be licensed to wrap other firms' "symmetric key" encryption programs so that they too would be able to use the new automatic key feature.
A personal identifier code
If you click on Manual Keys, you can skip by identifying yourself to the program. If you want the advantages of automatic keys, you make up a seven character code that uniquely identifies you to your copy of MarpX Privacy. You choose from among 3.5 trillion possible keys, and keep it to yourself.
Why have a personal ID? It's as if the program asks, "Who are you?" When you input the code, it replies, "Here are the names of your buddies" ... your list of confidants. You pick one, and you are ready to encrypt or decrypt messages and files that are shared between you.
Other persons -- friends, colleagues
More people -- this time, people that you know with whom you wish to share content privately and securely. They need a copy of the free MarpX Privacy program. And they each need a thirty second phone call with you, or a short note in the mail (but not email!) to share an authentication code.
Persons become confidants
A confidant is someone who shares in confidence. You and your friends / colleagues become confidants by exchanging a seven character "authentication" code (different from your personal ID) that applies to your exclusive sharing. Typically, two people become confidants at a time... you and your friend, you and your fellow worker, whoever. It's done by agreeing offline on an authentication code, and then each entering the confidant relationship (the other person's name, the date, and the authentication code) in a special roster file in the program.
It's okay to enter yourself alone as a confidant. Once you have input the authentication code, you can forget it. Forever after, you can archive computerized stuff, store it wherever you want, and get it back, without having to remember or even think of any codes, other than your personal ID. It works, even on days that you aren't on speaking terms with yourself.
It's also possible to have a group of people as confidants -- the Payroll Department, the bridge team, the study group, whoever. Each member of the group enters the agreed upon team name and the same shared authentication code in each of their rosters of confidants. The more people in the group, of course, the greater the risk that someone may let outsiders know the authentication code. Be careful. Think security!
A roster of confidants
A roster is simply a list. It's not meant to be seen by anybody except yourself. No two persons have the same list of confidants. If it is a confidential setup between two people, you will naturally use the other person's name in your roster.
MarpX Privacy lets you easily add to the list, edit it, delete confidants, and backup your list. Once you have an agreed upon authentication code for a confidant relationship, it takes hardly 30 seconds to add the new relationship to your list / roster.
Little pseudo-keys, massive real keys
Everything above deals with seven character codes -- one ID code for your personal use, one authentication code for each of many confidant relationships. The invisible encryptions are also based on seven character keys, but (a BIG but) those are pseudo-keys that stand in for the vastly larger encryption keys that are really used to protect your content. The real keys in the current version are 336 bytes (2688 bits) and can be scaled much higher if either quantum or conventional computers get vastly more powerful. Chapter 3 of Full Speed Ahead and Damn the Qubits! explains the scalability of our solution to quantum hacking.
An underlying purpose in all encryption is to make life difficult for hackers and eavesdroppers. One trick is to keep changing the keys. The invisible keys underlying MarpX Privacy change every 15 minutes. Keys are the same within a confidant relationship; they are different for everyone else in the world.
We could have selected a change every minute or every two seconds if desired. And firms who license our technology will be shown exactly how to do that.
Optional Extreme Encryption
Above, we mentioned three and a half trillion as the number of possibilities in codes and keys. If a hacker in a brute force attack tries every combination of A-Z, a-z, and 0-9, and is able to work at the rate of one combination per second, it will take 111,000 years, and that's to break only one combination. The next one will take another 111,000 years.
That's before introducing MarpX Extreme Encryption which serves as an optional add-on to the free program. Currently U.S. Export Administration Regulations restrict the use of Extreme Encryption to the United States and to people and entities that don't show up on the Consolidated Screen List of "bad boys" in the U.S. Extreme Encryption "Private Exchange Tools" (PETs) may be purchased at https://buyextremeencryption.com. What is the effect of Extreme Encryption on security? The hacker is confronted with a count of keys that is 623 digits long. In other words, there is no way even one message or file can be decrypted any time within the lifespan of this universe.
That's a strong claim. The count of possible keys is simple mathematical fact. The only way hackers can make any headway is to find patterns in encrypted content that enable them to cut the number of options they have to try. We invite hacking! If anyone can find patterns within our encrypted files, we know exactly how to strengthen the encryption and invite them to try again. And we can scale this method up indefinitely.
Full Quantum-Proof Security
MarpX Privacy does not conform to current encryption standards. In the same way, you and I drive at night without our cars being preceded by a pedestrian carrying a lit lantern to warn of our approach. Old standards were nice in their time. Those old standards don't matter now or at least not for much longer. Quantum computing is coming on strong -- China, Google, IBM, and many more are pouring in money and doing the hard engineering work that is needed.
Go ahead, spend heavily. We are not concerned. Suppose quantum computing could conduct 1080 tries per second to get at the correct key for one message or file. (Ten to the power 80, a number 81 digits long is a rough count of the particles in the entire universe, in other words a very large number.) Quantum computer hacking of one MarpX Privacy encryption would still take more than 10535 years. Score: Marpx Privacy, one. Quantum computing, zero. Sorry about that.
Encrypt something -- utter simplicity
Get a copy of the program for yourself. (Did we mention that Marpx Privacy is free?) Set up one confidant relationship. Select that confidant. Go to the Encrypt a File page. Browse and select a file. Click Encrypt. You're done. MarpX Privacy tells you the name of the encrypted version and where it is located.
Go the the Encrypt a Message page. Type or paste in a message. Click Encrypt. You're done. MarpX Privacy tells you the name of the encrypted version and where it is located.
No keys. Just encrypt something. And send it on securely. Utter simplicity.
Decrypt something -- utter simplicity
Same as the above, except that you go to one or the other Decrypt Page after you have received either a file or a message from one of your confidants.
Again, no keys. Again, utter simplicity.
For regular MarpX Privacy, what's 111,000 years or so among friends -- or among hackers?
With an add-on Extreme Encryption PET in a confidant relationship, the challenge to hackers lifts totally out of sight. Even if it's the year 2050 and the hacker has access to the latest and best in Quantum computing, there's no way. Your content, your organization's knowledge base, all are utterly secure.