Future Assistant

Future AssistantFuture AssistantFuture Assistant

Future Assistant

Future AssistantFuture AssistantFuture Assistant
  • Home
  • Services
  • About Us
  • Contact Us
  • The Doctor's blog spot
  • UUID
  • 3WRE
  • Guardian
  • Universal Gravity Pump
  • PCAMs
  • More
    • Home
    • Services
    • About Us
    • Contact Us
    • The Doctor's blog spot
    • UUID
    • 3WRE
    • Guardian
    • Universal Gravity Pump
    • PCAMs
  • Home
  • Services
  • About Us
  • Contact Us
  • The Doctor's blog spot
  • UUID
  • 3WRE
  • Guardian
  • Universal Gravity Pump
  • PCAMs

Three-Way Ramp Encryption

3WRE Basic's

  • The safeguarding against theft covers many facets of today’s commercial world; and it is all too easy to fall foul of litigation for failure to protect the entrusted assets of another person!

 

  • “There are many ways of safeguarding a person’s assets; though, it is not my intention to inform the reader of things that they should already be aware of as laid down ‘ISO 27000 Volumes 1 to 5’. If done correctly, and due diligence is correctly applied then mitigation can also limit the liability against a company; And it is all too easy to suggest to a client via mitigation: “Sorry we done all we could but the thieves still took your assets”; That does not fix the problem and reduces confidence in a company. The result is a failure before the client, and a failure of the company; neither can be allowed to happen”. 


  • Electronic data also comes in many forms, from a text message to an image, to video, to an accumulation of wealth to medical and professional records to legal and governmental documentation. All need to be protected from loss and or theft. Yes, encryption can be used, likewise off line and long-term storage; but both fail to adequately protect the client and company. 


  • Reviewing any current process of encryption displays several flaws, that is from the fact that it is binary (zero and one) thus decipherable (over time). All modern encryption relies on the asymmetric bidirectional public and private key exchanges; Where the encryption algorithm is predefined within the time constant and the content of the private key. The resultant, part thereof, produces the public key. With the two keys, asymmetric calculations are performed on a static data set, (a document or data block is then encrypted). Given time, and the right processing power “ANY” binary encryption can and will be cracked; That does not offer to the client the desired comfort zone they so desire for their most precious assets; And, as long as a two-state condition is used the client’s assets will always be at risk. 


  • Today, it is possible to achieve an encryption that is truly unbreakable. After many years of consultancy with clients such and NATO, Governments, Medical and financial institutions I have developed the first three-way ramped encryption; more over it can be embedded into hardware which has the result of speeding the process of encryption and decryption exponentially. The flaw with all hardware encryption is the ability to attack the encryption algorithm off line; but as all attacks are binary based, the three-way ramp remains intact against any modern or future encryption attack. 


Copyright © 2014 Professor Nigel Cheese - All Rights Reserved.

Iondio does not release any data to anyone

  • Privacy Policy
  • UUID

This website uses cookies.

Laws in certain countries require cookies and tracking; However, irrespective of those laws... "WE" do not track via cookies, it is suggested that you DECLINE all cookies, in that way We have abided by the law to tell you cookies are present and you can decline and keep this site safe from SNOOPING Adverts and Google Tracking.

ALWAYS DeclineDO NOT Accept