In the context of an information security system, would the fact of fragmenting the data into several independent encrypted files would make the system Quantum-Resistant ?


In 2018 IBM is making available the first quantum computers.

This can be a disaster for most security systems based on computing power.

Could this type of scheme bring a solution to this problem ?

Framgmenting information
Thanks in advance for your answers.

Ex0 SySCreationAsked:
Who is Participating?
Dr. KlahnPrincipal Software EngineerCommented:
It depends on a passwords and PIN codes, which -- if quantum computers ever become workable for practical use, which won't be for some years yet -- will be relatively quickly solvable by a quantum computer "of a large enough qubit capacity".  I see nothing truly novel here.

[flame on]
When a description says "proprietary algorithm", what it generally means is "We suspect there are really big holes in this, and we're not going to submit the algorithm to the security community so that they can expose the problems."  (Always remember Zeosync and infinite compression.)
[flame off]
Ex0 SySCreationAuthor Commented:
Thank you for your answer, we fully understand this point of view.

If we are talking about the proprietary of our algorithms, this is by no means an element we rely on for the safety and the reliability of our system.

We could expose this algorithm publicly without changing anything about the security of protected data.

This is not because the algorithm would be known that it would allows to decode data that is not intended for us.

If we make this choice it is simply a strategic desision because we do not wish to be stolen our discoveries.

How could we resolve this issue without compromising our research and our discoveries?

Thanks for your advises.
Ex0 SySCreationAuthor Commented:
In addition to our previous explanation, we would also like to point out that this data security system is absolutely NOT based on a Personalized-Password or a Time-PIN-code to guarantee its efficiency.

Indeed, there are 3 possible security levels, the first (Vaut Level 1) has itself NO Password or PIN-Code to secure information.

These 2 elements are present only for purposes of personalization of the global security, respectively adding a Time-PIN-Code for the second level (Vaut Level 2), all in combination with a Personalized-Password for the third and last level (Vaut Level 3).

Since the first level of security, this system is based on the fact of Re-Scheduling the Binary Code of the source data in order to describe its structure and in the end to fragment the set into 4 separate destination files (Main-Protected-File and Physical -Key-File 1,2,3).

By NOT modifying the source binary code so that it becomes incoherent and therefore not reversible, one could even consider that at the first securisation level (Vaut Level 1) the information is not really encrypted, but more simply encoded.

You can see for yourself the result obtained on the Binary Re-Scheduling of the final structure of protected data by watching this small video posted on YouTube  :
YouTube Screen Capture
Of course, all this goes back to our main question of whether or not if would the fact of fragmenting the data into several independent encrypted files would make the system Quantum-Resistant ?

Thank you for your interest and have the pleasure to read you very soon.


All Courses

From novice to tech pro — start learning today.