Focus on improving our planet.
Let's collaborate for sustainability &
digitalization.

Open innovation Platform for sustainability.
Find the right opportuinty and grow up your
innovation ecosystem.

Sign in/up

Search an
opportunity

Do you want to be part of innovative a sustainable project? Search for your opportunity and make your contribution to for the sustainable growth of the economy and the planet.

Tech collaborations
Joint Ventures
Licensing
Subcontracting
Investment

Express interest
Non-mathematical and quantum-proof data cryptography method...
created · Updated
Deadline: May 14, 2022
Received 0 expressions of interest

Summary

A German IT developer has developed a quantum-safe data encryption method. It is non-mathematical, random-based and has just been patented. Its innovative character lies in proving that randomly encrypted data can be decrypted after all. The company looks for partners from the IT sector, preferably with a link to IT security, for licence agreements or technical cooperation agreements to further improve the technology.

Description

The controversial backdoor access for national security services is already a serious threat to IT security. Sooner than predicted, the sheer computing power of quantum computers will also be able to break these mathematically created cipher rates.

A German IT developer has devised a non-mathematical, quantum-safe encryption method using random numbers. The approach is based on the One-Time-Pad (OTP) procedure, previously used to encrypt the "red phone" between the USSR and the USA, the disadvantages of which have been eliminated.

Until now, it was unanimously believed that random numbers could not be used for encryption because there was no way to decrypt the randomized data. The developed solution addresses this problem by using a data key that exchanges, shifts, separates and rearranges bytes.

Innovatively, it is not a mathematical encryption method. The new encryption method encrypts by coincidences. This does not mean the pseudo-randomness in the programming languages, but real randomness, which is derived from the data to be encrypted.

During encryption itself, the procedure randomly selects new OTPs to encrypt the original. Therefore, the amount of data that can be encrypted is unlimited. The use of the single OTP has also been significantly extended. Basically, one byte is replaced by two bytes that are written separately and distributed randomly in the ciphertext. Only after these two bytes have been correctly reassembled and placed at the position where the byte had been located in the original can the encrypted byte be reconverted to the original byte. In contrast to the previously known OPT method, the new method can be used to encrypt not only texts, but any data.

Currently, the encryption method is only used in a software for encrypting files. The German IT developver also sees great potential in cloud applications. However, the method is suitable for all encryption applications, except for the use of public keys, as used in asymmetric encryption methods.

The method is platform independent. A file (or data stream) encrypted on operating system X can then be decrypted on any operating system.

Several routines are built into the encryption method rendering it impossible to crack. Furthermore, it is technically impossible to program a backdoor into the encryption process unless one wants to permanently transmit the generated data keys over the Internet.

Moreover, not a single byte of the original is encrypted with the original data key owned by the user. Instead, first thing the routine will create a new key. It is therefore not possible to deduce the data key from the ciphertext, nor do the data keys used for encryption continue existing, or are likely to ever be generated again, given the large number of possible data keys.

The ciphertext never becomes larger than 250 percent of the original, and the energy savings over blockchain technology are substantial.

If the method is used for encrypting data streams, both the sender and the receiver must of course be in possession of the symmetric data key. This can be generated, for example, by using an Internet text, a song, or a YouTube video.

In any two encryption processes with the same data key, two completely different ciphers will be created from the original, which is then reconverted to the same original again when decrypted. The set of possible keys amounts to a minimum of more than 259 *10 to the power of 157823 variants and can be upscaled at will.

The company is looking for companies in IT and computer science, preferably in IT security, for license agreements or even technical cooperation agreements to further improve the technology.

Research organisations could be suitable partners if they are interested in converting the solution from pure software into hardware.

The necessary know-how will be provided by the German IT-developer.

Advantages & innovations

- Quantum-proof method that cannot be cracked - No backdoor access - Almost universally applicable

Stage of development

Available for demonstration

Partner sought

The company is looking for companies in IT and computer science, preferably in IT security, for license agreements or even technical cooperation agreements to further improve the technology. Research organisations could be suitable partners if they are interested in converting the solution from pure software into hardware. The necessary know-how will be provided by the German IT-developer.

Create an
opportunity

Show your project-opportunity to generate interest of potential partners or collaborators. Companies, freelancers, or research centers can meet in Nir-vana and become perfect team together!

Latest Opportunities

EIT Food Public Engagement Proof of Concepts Call for Proposals 2023,...

published
Deadline: Aug 15, 2024
Project full name: EIT Food Public Engagement Proof of Concepts Call for Proposals 2023, 2024, 2025
Project acronym: EIT Food PE PoC Call 2023, 2024, 2025
Grant agreement number: N/A
Total EU funding available: €360 000 per submission window (total for 3 rounds: €1 380 000)
By the date of the Calls’ launches a webpage will be activated at eitfood.eu/projects/public-engagement-proof-of-concepts-call

Join and create
your ecosystem

Meet and connect with experts from around the world. Generate your innovative ecosystem and interact with them thanks to the different functionalities of Nir-vana: exchange spaces, lists of opportunities, expression of interest

Molly Rogstadius
Björn Jürgens
Build your project with
the best professionals
in the sector
Latest Opportunities

    EIT Food Public Engagement Proof of Concepts Call for Proposals 2023,...

    published
    Deadline: Aug 15, 2024
    Project full name: EIT Food Public Engagement Proof of Concepts Call for Proposals 2023, 2024, 2025
    Project acronym: EIT Food PE PoC Call 2023, 2024, 2025
    Grant agreement number: N/A
    Total EU funding available: €360 000 per submission window (total for 3 rounds: €1 380 000)
    By the date of the Calls’ launches a webpage will be activated at eitfood.eu/projects/public-engagement-proof-of-concepts-call
    Swedish SME in the hygiene sector produces washable re-usable absorbent underwear helping people with little leaks such as incontinence (urine escape due to bladder weakness) or other forms of leakage during periods or pregnancy. Compared to disposable products they are environmentally sustainable, less costly, providing a sense of normalisation and comfort for users. The SME is looking for sales agents, retailers, distributors interested in entering business collaboration agreements
    Company based in Sweden, is a pioneering force in digital cleaning training, specializing in e-learning for cleaners, supervisors, and clients. With a proven track record since 1994 and a recent foray into international markets, companyseeks strategic partnerships in Europe.
    Spanish company manufacturing vinegars, lemon juice, food dressings, balsamic creams and other related products in different types of containers and different formats and weights, is looking for wholesaler or distributor. Preferred channels: supermarkets, large distribution, convenience stores, hospitality services (hotels, restaurants and catering), gourmet shops and others.

The most relevant open & connected
network for sustainable business development.

Join now!

Sustainable
projects

Nir-vana wants to be the first open innovation platform focus on sustainability.

According to the EU Action Plan there is a huge need of change to a more sustainable future and to collaborate and assure to achieve the SDG.

Network
& experts

Nir-vana is the only platform integrating seamless "search and find" to the next stage of collaborating.

Get connected with experts and companies for partnering. Find trusted innovation advisors, certified by Enterprise Europe Network and build up your team of partners, companies and experts you need for your innovation.

Find public funding &
private investors

Discover potential funding opportunities for your innovation. On nir-vana you have access to national and EU funding programmes, public funding and private investors.

Get connected to consultants and advisors specialised on funding and grant preparation.