top of page
titanic_j5404.png

NIST, like the Titanic, is the best technology of the day.  The masters of the Titanic were prudent enough to equip it with lifeboats.  So should you!

Cyber Quantum Threat:
It is Irresponsible to Ignore this NIST-Alternative
An Open Letter to Chief Information Security Officers

Dear Chief Information Security Officer,

By the end of the day it is not the US National Institute of Standards and Technology, NIST, that is responsible for your data security, it is you. NIST helps, considerably, pointing out vetted products helping you withstand a coming quantum computer attack. But the small print says 'no guarantee' and for good reason. Quantum hacking, like all hacking, boils down to detecting and exploiting a hidden pattern in the security posture. So NIST offers a mathematically complex pattern which should be too well hidden for the quantum hacker to detect. Hopefully that is the case, alas, in principle it is never a good idea to build a security apparatus based on assuming the adversary not to be smarter than expected.

NIST cryptographers are very smart, and if they don't see a way to breach the ciphers they propose, it is quite likely that others would be stymied too. And here comes the point: a responsible CISO will address the possibility of a quantum attack more potent than expected. This sense of responsibility should guide you as a Chief Information Security Officer, CISO, to read on carefully.

BitMint is not offering a cipher more complex, more entangled than NIST, it come to you with a different approach altogether. Hackers detect and exploit patterns, so let's project security without pattern. No pattern, no pattern to detect, no pattern to exploit, no hacking. Pattern Devoid Cryptography offers the elusive guarantee, mathematical guarantee, for security. We replace pattern with perfect randomness. Perfect randomness, in principle, cannot be broken - however smart you are, however powerful your computer. If I toss two dice and you are smart you guess the outcome to be 7, not 12, or 2, but if I toss only one die then smart or dumb, you guess right on average 1/6 of the times. Randomness voids the advantage of smarts and the advantage of fast computers

Pattern Devoid Cryptography has matured into dozens of US granted patents, it was peer-review published, and it is used in stealth by high-end security shops. Again, the NIST solution are quite likely to stand up to the coming quantum attack, much like the Titanic was regarded as the "ship that cannot sink". You may regard Pattern Devoid Cryptography, PDC, as the "Lifeboats on the Titanic", don't sail without them!

Your sense of responsibility, dear CISO, combined with your natural curiosity will guide you to contact me for a one on one non-committal conversation [Prof. G. Samid, Gideon@BitMint.com]. You can also check our website (BitMintalk.com), our publications, and our 42 patents.



 

lifeboat_sec.png
cyberlock_edited.png

If you want a guarantee of cipher security then Security.Bitmint.com is your only source. Our merchandise comes with mathematical proof of efficacy.

openendedTESTOR.jpg
TESTOR_J5828_logo.png
testor_flood_j5831.png

Cyber Security is Vulnerable to Adversarial Mathematical Innovation.

Do You Ignore this Vulnerability?

Choose the BitMint Alternative!

Elastic Encryption

AI Empowered Cryptography

AI Redefines Cryptography, Don't Stay Behind!
vsign_small.png
It is so simple: packing into the ciphertext many decoy messages alongside the true message, No way to distinguish among them. No way to identify the true message, regardless of whether the underlying cipher has been compromised.  End of cryptanalysis as we know it -- just by packing decoys into the ciphertext.  Amazing that it has not been done before!
vsign_small.png
It is the advent of AI, it automatically generates fake messages that look and sound the way a true message looks and sounds. So when the hacker extracts a plaintext message from the ciphertext they know that they most likely extracted a fake.  Being smart and using quantum computers does not help.
The President is right, Signal App is insecure. Same for any cryptpgraphy with a lock. A lock can be picked if you are smart enough.

To be secure, use Pattern Devoid Cryptography where the secret is indistinguishable from the noise!

Pattern is a lock. No pattern no lock, no lock to be picked.

Randomness is where no pattern survives, and there your secret is safe!

World dominance is determined in cyber space.

Everything we do today in cyber space is vulnerable to the Single Smart Mathematician Threat.


A thousand not-so-smart mathematicians are no match to a single smarter mathematician.

The power grid, banking, transportation,  healthcare,  communication,  the military are all vulnerable.  

The Clock is Ticking, one smart mathematician on the other side is all that is needed for us to suffer the equivalent of a thousand nuclear bombs.

There is only one way to protect our civilization: pattern-devoid cryptography

White Structure

Trans-Vernam Quantum Resistant Ciphers: a NIST Alternative

Supervised Learning AI Cracks NIST short key Post Quantum Ciphers!

The cipher you use today hinges on the hope that your attacker is not smarter and not better equipped than expected. Alas, the history of cryptography is a repeat tale of attackers who were smarter and better equipped than expected.

BitMint ciphers break away from this daunting shadow. Offering a new class of security: not based on mathematical complexity which can be simplified, rather based on randomness that defies predictability. Furthermore while the user cannot tweak the math of the complexity cipher, the user will readily pour more randomness to his BitMint cipher, and take control of the security of his own communication.

BitMint ciphers represent such a dramatic break away from the inertia-driven complexity cryptography that the first reaction of any seasoned cryptographer is: "No Way!" And then they come around. The simple idea that raw randomness saves the day shines through.

BitMap_H35_needle.png
BitMap_H35_TeslaCrypto.png

A Tectonic shift in cyberspace. Today the edge and the power is in the hands of the better mathematicians and the bigger computers. We, the people, keep our privacy in cryptography that looks hard and complex to us, but is routinely violated by the mathematical elite. 

It's time for a change, time for a new paradigm. We can now establish basic privacy and data assets security without resorting to mathematical complexity. Using randomness instead. Randomness is free and plentiful. Today’s Internet is robust enough to carry it, and it and thereby build security that is immunized against a hacker which is much better equipped than we are, and much smarter than we are. 

How Important is it? Freedom and dignity begin with privacy. Innovation and personal-reorientation emerge from an unviolated personal space. A conversation that remains within the conversing parties is the foundation of a free society. The more integrated we are on this earth, the more our privacy, freedom and dignity are at risk, and the more difficult it is to uphold this societal foundation. 

To explain the paradigm think of a chess game. You play against a world chess master. Before you start the game, the chess master knocks off one of his rooks. It does not help you. Your material advantage is not enough to overcome the smarts advantage of the master -- you lose. However, if you secure the same material advantage, one rook, in a game where both of you remain with the king only, and now you have an extra rook -- you win. No matter how much smarter the chess master is, the game is yours. What's the difference? It is one rook advantage in both cases. The difference is complexity. The complexity of the interacting thirty one pieces plays into the hands of the smarter player. When you remove this complexity and play a simple board, the smarts advantage disappears. 

That is exactly what the people’s cryptography does. It levels the playing field. It gives you the tools to think, say, converse, exchange with trusted parties, secure from exposure, even vis-à-vis those who have otherwise full power over you. Freedom and dignity start with privacy. Now privacy is re-enabled. 

The People cryptography is easy to use, but to fully appreciate its power requires some learning. You can learn it the hard way by reading "Pattern Devoid Cryptography" or you can approach the people’s cryptography by entertaining yourself with a nail-biting thriller “The Cipher Who Came in From the Cold”, available everywhere. And you can always write to info@BitMint.com to talk to us. We are looking for good people!  

 New: Writing data in the language of chemistry, off the digital grid. Hack secure

bottom of page