Skip to the content

DARE SAFE is One-Time Pads Now, not Later !!

With the CYPHYX patented technology called DARE, Dynamic and Random Encryption, you can have one time pads now instead of having to wait for Quantum Key Distribution later.

Per the article to the right, the only truly safe protection comes from using a one time pad.  From the article;

For really secure communications, you then need to share a new key each time you want to communicate information that is supposed to be secret. The use of a new key each time is considered to be equivalent to using what cryptographers call a one-time pad. A one-time pad harkens back to the days when an actual encryption key was distributed on paper and a unique sheet of paper was used each time. Because each key is used only once, cracking such encryption is difficult.

DARE uses encryption keys in the same way as a one time pad.  For each protection of data DARE random selects and creates a new key.  This key exists for only a few nanoseconds, just long enough to encrypt the data.  And then it is destroyed.  To unprotect the data the key must be completely reconstructed from a synchronized environment thus making it impossible for any outside third party to obtain the key.  

So just as with one time pads, the key used by DARE is random, used only once, and then destroyed.  But unlike one time pads, DARE takes this concept even farther.

For each time that DARE protects data it goes through the process of creating a completely new and random key.  In addition to the key, it also randomly selects the algorithm used for encryption as well as randomly selecting all of the other parameters needed to perform the encryption.

The complexity of DARE and its function, the diversification of components, and the ability to spread component to multiple locations while still allowing it to function is what takes DARE to a level even higher.

So while quantum key distribution may allow for near constant key exchanges and therefore the ultimate one time pads, it still doesn't implement a variation in algorithms or supporting parameters like DARE.  It may provide a higher level of encryption than currently exists for products and technologies that utilize algorithms and keys, but it still is the same method of implementation, one that hackers know far too well.

And add to this the fact that quantum key distribution is not completely secure.  As shown by quantum cloning experiments where it is possible that photons in transit can have their state copied without altering the state of the original photon.  Thus it is possible to create another invisible link to the photons in use for key distribution.  Because of this reason and along with other possible difficulties with logistics and distance, it becomes clear that while quantum key distribution has a lot to offer, it is by no means a panacea for all that is wrong with current methods of cybersecurity protection.

Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security

The idea behind the use of quantum computers to break encryption lies in the fact that the encryption keys used by current encryption methods depend on a secret key that is used to encrypt and decrypt the information that's being protected.

About the author

CYPHYX

CYPHYX

CYPHYX is a dynamic company with cutting-edge products that will solve problems or needs.  

For really secure communications, you then need to share a new key each time you want to communicate information that is supposed to be secret. The use of a new key each time is considered to be equivalent to using what cryptographers call a one-time pad. A one-time pad harkens back to the days when an actual encryption key was distributed on paper and a unique sheet of paper was used each time. Because each key is used only once, cracking such encryption is difficult.

Wayne Rash, eWeek article, "Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security"

CYPHYX

12870 Trade Way Four
Suite 107  #665
Bonita Springs, Fl. 34135

Email. info@cyphyx.com