As mentioned in other articles, CRIPTEOS 3001 is a symmetric encryption with 2 keys of 128 kilobytes, therefore, brute force attempts to violate the keys are 256 raised to 131072, an impressive number that even current supercomputers and future quantum computers do not they will be in the slightest violation.
But the problem that until now symmetric cryptography systems had, that is that both people who want to transmit messages must have both the algorithm and the key, is that of the transmission of the key, which, if it is intercepted, being the public algorithm, leads to the violation of the message.
For this reason, the public key and private key system was invented, a complicated system based on the properties of prime numbers, which used the public key, very slow in coding, practically only to transmit the private key. Also symmetric key algorithms , based on the AES256 standard, were very slow and unsuitable for large amounts of data.
CRIPTEOS 3001, supported by some Italian patents, proved to be very fast by encrypting half a gigabyte of data in 80 seconds with any computer, 4 gig of ram, windows 7, processor not particularly fast.
The problem of the transmission of the key remained. Until now I said that it was enough to send it with postal mails outside the internet, and I was wrong. I was convinced that a key had to be transmitted. And I was wrong. Analyzing the operation of CRIPTEOS 3001, it can be seen that it needs two 128 KB keys. TWO KEYS. Me who prevents me from sending more keys where the customer chooses the ones he wants.
I therefore identified the correct number in 256 keys. The customer and his partner buy the bunch of 256 keys and only need to securely transmit two numbers. Then, operationally, they encrypt and decrypt with the two keys identified by the two numbers.
An eventual attack that steals the deck of 256 keys therefore has no effect, because the possibility that the customer has to choose the 2 keys out of 256, that is the permutations. A huge number. Since there are 31 million seconds in a year, even if we carry out a billion operations per second, we have 31 times 10 raised to 15 operations in a year, only 15 to be subtracted from the imposing exponent of CRIPTEOS, thus the life of CRIPTEOS is much higher than that of the solar system…
.Recall that the algorithm of CRIPTEOS 3001 is not the stupid cryptography of HASH, which is not safe and it is not reversible, but a powerful algorithm designed tested and optimized in our laboratories



BASI DI CRITTOGRAFIA e certificati digitali