Quantum Cyber Security Protection

Quantum grade encryption using blockchain for government & federal agencies this is our mission. We design software that requires Bio metrics, retina scan, voice detection & facial recognition for authentication & ID verification. We effectively risk assessment, networking upgrade assessments, firewall & penetration testing while also minimizing human error with Quantum cyber education & cyber prevention techniques. We use SHA3- 512 bit hashing algorithm for the foundation of our blockchain and SIDH with Optimal asymmetric encryption padding together with curve 448







Secure Cyber Security through Anubis Cloud with Sphinx Protocol

A History of Cyber Security
Quantum Attack Resistance

Triple Layer Protection

Blockchain Algorithms

Sphinx SHA3-512 Asymmetric Encryption

Sphinx SHA3-512 is a high-security post-quantum hash-based signature scheme that signs tens of thousands of data transactions per second on a modern Intel CPU. Signatures, public keys & private keys are verified in Anubis Cloud using GPU-accelerated Virtual Machines with Quantum Processing Units. This Quantum Resistant Blockchain is immune to Shor’s algorithm and designed to provide long-term security even against attackers equipped with quantum computers and exceeds the computational processing power ability of traditional classical computers that use semiconductors.

Adaptive Multi-Factor Authentication

While connecting to Anubis Cloud we use Internet Protocol (IP) Security with downloadable Air Gapped Certificates and allow access by requiring multiple site security certificates loaded into your browser. When connecting to our blockchain platform both Public Key Infrastructure (PKI) , Personal Identity Verification (PIV) or Common Access Cards (CAC) are verified with our security certificate protocols to authenticate a connection. Portions of web sites and dashboard features also require PKI/PIV/CAC certificates for access to these sites, directories and pages requires all three your personal certificate, site security certificate and personal private key.

Curve 448 using SIDH

Using Curve 448 an approved elliptic curve offering 224 bits of security and used by the US Federal Government per in RFC 7748, we take advantage of more authentication options with the choice of having temporary tokenization for the public keys, multiple public keys or static using certification methods to unlock data better traditional Diffie–Hellman.

Both Favored by US National Institute of Standards and Technology (NIST) and the Internet Research Task Force Crypto Forum Research Group (IRTF CFRG) for inclusion in future Transport Layer Security standards. (TLS) is a cryptographic protocol used to establish a secure communications channel between two systems.

We combine Curve 448 & Supersingular isogeny Diffie–Hellman key exchange (SIDH) a post-quantum cryptographic algorithm used to establish a secret key between two parties over an otherwise insecure communications channel. This is analogous to the Diffie–Hellman key exchange, but is based on walks in a supersingular isogeny graph and is designed to resist cryptanalytic attack by an adversary in possession of a quantum computer.

One common characteristic of many post-quantum cryptography algorithms is that they require larger key sizes than commonly used “pre-quantum” public key algorithms. There are often tradeoffs to be made in key size, computational efficiency and ciphertext or signature size. We solve this issue using a compressed-key version of the SIDH protocol with public keys only 2640 bits in size.This makes the number of bits transmitted roughly equivalent to the non-quantum secure RSA and Diffie-Hellman at the same classical security level.

Out of all post-quantum key exchanges, SIDH uses the smallest keys; with compression, SIDH uses 2688-bit public keys at a 128 bit post-quantum security level. SIDH also distinguishes itself from similar systems such as NTRU and Ring-LWE by supporting perfect forward secrecy, a property that prevents compromised long-term keys from compromising the confidentiality of old communication sessions. These properties make SIDH a natural candidate to replace Diffie–Hellman (DHE) and elliptic curve Diffie–Hellman (ECDHE), which are widely used in Internet communication and are prone to be attacked by Quantum Computing in the next few years.

Randsomware Prevention

We effectively reverse engineer protocols to prevent & educated companies on cyber security trends

EternalBlue, sometimes stylized as ETERNALBLUE, is an Windows Operating system exploit developed by the U.S. National Security Agency (NSA). It was leaked by the Shadow Brokers hacker group and was used as part of the worldwide WannaCry ransomware attack on May 12, 2017 and now exploits pirated or non-updated windows 10 and below Operating Systems. These malicious computer programs and other weaponizing data science applications for social engineering and automated E2E spear phishing can be stopped with our cyber security practices.

What is Phishing?

E-mails are sent out to conduct phishing and inserts Trojan. Once the Trojan is let in it applies self replicating payloads through a worm in the SMB protocol to infect networks and computers to exploit vulnerabilities in file sharing from small computers to the main server. This technology was used by former government in counter terrorism and convert intelligence operations but is now used by cyber hackers to gain data from organizations, corporations and high net-worth individuals.

Cyber Defense Against Machine Learning

Today in machine learning environments, many hackers are utilizing machine learning to poison target machine learning engines, which can make the rest of target neural network vulnerable. It is very rare to see any machine learning cyber security system in place at the moment. With us, we are implementing all cyber security best practices in machine learning environments, where all hacks into the system can be preventable by using a complex encryption algorithm methods & protocols to protect against any future advanced Threats that strong A.I. Poses.