As mentioned in other articles, CRIPTEOS 3001 is a symmetric encryption with 2 keys of 128 kilobytes, therefore, brute force attempts to violate the keys are 256 raised to 131072, an impressive number that even current supercomputers and future quantum computers do not they will be in the slightest violation
But the problem that until now symmetric cryptography systems had, that is that both people who want to transmit messages must have both the algorithm and the key, is that of the transmission of the key, which, if it is intercepted, being the public algorithm, leads to the violation of the message.
For this reason, the public key and private key system was invented, a complicated system based on the properties of prime numbers, which used the public key, very slow in coding, practically only to transmit the private key. Also symmetric key algorithms , based on the AES256 standard, were very slow and unsuitable for large amounts of data.
CRIPTEOS 3001, supported by some Italian patents, proved to be very fast by encrypting half a gigabyte of data in 80 seconds with any computer, 4 gig of ram, windows 7, processor not particularly fast.
The problem of the transmission of the key remained. Until now I said that it was enough to send it with postal mails outside the internet, and I was wrong. I was convinced that a key had to be transmitted. And I was wrong. Analyzing the operation of CRIPTEOS 3001, it can be seen that it needs two 128 KB keys. TWO KEYS. Me who prevents me from sending more keys where the customer chooses the ones he wants.
I therefore identified the correct number in 64 keys. The customer and his partner buy the bunch of 64 keys and only need to securely transmit two numbers. Then, operationally, they encrypt and decrypt with the two keys identified by the two numbers.
An eventual attack that steals the deck of 64 keys therefore has no effect, because the possibility that the customer has to choose the 2 keys out of 64, that is the permutations, becomes 64 factorial or 10 raised to 89 possibilities. A huge number. Since there are 31 million seconds in a year, even if we carry out a billion operations per second, we have 31 times 10 raised to 15 operations in a year, therefore, subtracting the exponents, we have 89 – 16 = 73, i.e. 10 raised to 73 years to find the right key.
Then ROBIONICA puts on sale the set of 64 keys and periodically updates it destroying the previous set. During the period of validity of the set of keys, advantageously all customers and their interlocutors can download the set of 64 keys, communicating for each pair of people the two numbers necessary to identify the right keys.
Recall that the algorithm of CRIPTEOS 3001 is not the stupid cryptography of HASH, which is not safe and it is not reversible, but a powerful algorithm designed tested and optimized in the laboratories of Roberto Montelatici, founder and CEO of Robionica.