## Preliminary Timing Results

The handshake was evaluated on a computer running at 2.7 GHz, while processing 336 bit encryption keys. The table below shows the time it takes to process the public/private keys, not including transmittal time. (cycles) is defined as how many computer cycles were needed to process the data. Divide the cycles by the speed of a device to calculate processing time. For comparison, the competition range listed are values published on Github (https://github.com/mupq/pqm4/blob/master/benchmarks.md)

# CEW Systems Canada Inc.

Post-Quantum Encryption

## CEW Systems Canada Inc.

CEW Systems Is proud to announce, after 4 longs years of software development, that a CTO funded third party academic peer review paper, written by Dr. Cyril Coupal of Saskatchewan Polytechnic Institute’s Digital Innovation Center of Excellence (DICE), has been publish on InfoQ, and can be downloaded from: https://www.infoq.com/articles/post-quantum-bisymmetric-hybrid-encryption/.

While the claims listed in our website, documentation and in the paper on our API software, called Bi-Symmetric Encryption, seem grandiose up front, it is important to understand that the software was specifically designed to use multiple layered encryption modules. Each module was programmed to present a different computational problem or attack challenge for either a quantum computer or to close a backdoor attack vulnerability. Whereas one simple encryption function maybe be overcome by several different means, multiple types of functions, each compounding the possibilities from the previous, will close more vulnerabilities. A door with one lock can be easily picked, a vestibule entrance with four successive doors, each with different multiple types of locks becomes much harder to break through.

For the study, Dr. Coupal was given, not only our internal white paper, but was also given full access to our source code along with example software programs from which the screen captures were taken.

Dr. Coupal described Bi-Symmetric Encryption in this way:

Bi-Symmetric Encryption uses a unique and novel handshake incorporating encrypted session key combinations, allowing user’s login credentials, biometric data, credit card data, or command/activation codes to be quickly and correctly processed, without directly transmitting this confidential data. The plug-and-play, hybridized encryption system employs concepts like

asymmetric encryption meshed with more secure symmetric encryption.

A significant difference from commonly employed asymmetric encryption is that during the initial handshake to set up communication, no vulnerable data are exchanged. Should the sender key communication be intercepted by a hacker, they still cannot pretend to be the originator of the communication to the receiver.

Dr. Cyril Coupal, Saskatchewan Polytechnic, Oct 2021

There is an important distinction to make when comparing Bi-Symmetric Encryption with asymmetric encryption. Both create keys to allow Alice to encrypt data for Bob, however, unlike the asymmetric public keys, which can be encrypted by anyone who intercepts the keys, Bi-Symmetric keys can only be encrypted the holder of the correct password or authentication key. This means Malory cannot encrypt a misleading message to send to Bob.

During the initial handshake, private keys are generated from or found in the form of login credentials, credit card information, biometric data, or other personal credential information or pre-shared private keys, which are then used to start the handshake and are never actually transmitted.

Dr. Cyril Coupal, Saskatchewan Polytechnic, Oct 2021

The Bi-Symmetric Encryption handshake is unique in that the initial private keys are never transmitted. This is true if the sender is using a password, credit card data, biometric data or any other data as the login credentials.

An important aspect of the encryption is that plain text characters in the data packets are modified individually instead of in groups or blocks, meaning that there are no overall mathematical relationships that can be identified. Each packet to be encrypted uses a different set of keys adding greatly to the complexity of the encrypted message. Several benefits result. Brute force attacks have no way in which to identify if an attempt to unencrypt a portion of the message results in valid useable data. Hence any possible outcome is as likely as any other outcome. When billions of possible outcomes exist, it becomes impossible to determine the correct one.

Dr. Cyril Coupal, Saskatchewan Polytechnic, Oct 2021

Dr. Coupal has described, quite succinctly, how and why the Bi-Symmetric Encryption system is brute force attack proof and since math formulas are not used to encrypt the data, quantum computers will be unable to find a mathematical formula to decrypt by. Quantum computers can very efficiently use both brute force attacks and mathematical based attacks when looking for, say the RSA math based key pairs.

It may seem contrary that overhead processing of the Bi-Symmetric Encrypted message does not add significant delays to encryption/decryption (as listed above in CEW System’s encryption runtime tests). This seems reasonable when one understands that instead of processing large byte sets in encrypted blocks, the system encrypts small blocks but with a large set of keys. Thus, processing is very fast while still secure. This is why the CEW Systems calls the handshake system the fastest, smallest, and largest of the encryption techniques.

Dr. Cyril Coupal, Saskatchewan Polytechnic, Oct 2021

Dr. Coupal's Conclusion:

The new and novel Bi-Symmetric Encryption system reviewed here offers multilevel quantum resilient encryption technology that has been specifically designed to be immune to brute force attacks, man-in-the-middle attacks, with the use of a timer, relay attacks and rolljam attacks (a method to break into an automobile by blocking and recording the signal transmitted by a car key fob and then used by the recording device to access the vehicle).

Dr. Cyril Coupal, Saskatchewan Polytechnic, Oct 2021