top of page
Writer's picturedarenklum

Why we need to move beyond NIST post quantum initiatives and into a new security modality.


For years we have all assumed that the security foundations of our digital world were sound. Our government and the cybersecurity industry have assured us for years and years we have nothing to worry about. We are safe, we are secure. Yet, today, we wake up in a world where security can't be found and the very digital world we depend upon each day is failing to protect you. Today, the very fabric of our digital lives are at risk!


At Secured2, we’ve embraced this challenge by going beyond the limitations of math-based cryptography and our failed security modalities. Our QuantaMorphic® technology uses the laws of physics to secure data in ways that math-based algorithms—no matter how advanced—simply cannot. Let me explain why this matters and how our approach fills the critical gaps in today’s post-quantum security efforts.


1. The Limits of Math-Based Security

Math-based encryption has served as the backbone of digital security for decades (back to the time of the first color TV). Systems like RSA and ECC are based on the assumption that certain mathematical problems—like factoring large integers or solving discrete logarithms—are computationally infeasible to solve. However, this assumption no longer holds in the face of quantum computing and the ability to subvert the very underpinnings of our security ecosystem.


NIST’s PQC Standards: An Incremental Fix

NIST’s post-quantum algorithms, such as Kyber and Dilithium, aim to replace traditional encryption methods with new, quantum-resistant ones. These rely on lattice-based cryptography and similar constructs, which involve complex, high-dimensional mathematical problems. While these are currently resistant to quantum attacks, the core vulnerabilities of math-based security remain:


  • Predictable Attack Surface: If an attacker gains insights into the underlying mathematical constructs (e.g., through advances in quantum or classical algorithms), the entire system is at risk.


  • High Resource Costs: Many PQC algorithms require significantly more computational power, making them impractical for certain applications, such as IoT devices and edge computing.


  • Lack of Long-Term Viability: Quantum computing is evolving rapidly, and it’s plausible that adversaries will find ways to exploit even these advanced mathematical constructs.


2. Why Physics, Not Math, Is the Future

Secured2’s approach does not rely on solving increasingly complex mathematical problems. Instead, we turn to the unbreakable laws of physics to secure data. Here’s how QuantaMorphic® technology works:


Data Transformation Through Physics

Our process involves four key stages:


  1. Anonymizing Data: In this process we turn the binary of a file into a randomized format.

  2. Shredding Data: Data is fragmented into small meaningless pieces using a physics-based process and randomly shuffled. These fragments are then distributed across multiple physically diverse locations (local, cloud, multi-cloud or hybrid) that customers choose.

  3. Storing Data: The fragmented data is stored in physically separate and independently secured environments, ensuring that no single fragment contains usable information.

  4. Reassembly on Demand: Data is reassembled only when authorized, with strict authentication protocols and environmental controls.


This process makes traditional attack vectors irrelevant because:


  • There is no usable data to intercept or decrypt.

  • Even if fragments are accessed, they are meaningless without the corresponding authentication mechanisms.

  • Data cannot be reverse-engineered due to its randomized state.


Physics-Based Randomization

Unlike pseudo-random number generators (PRNGs) used in traditional encryption, Secured2 employs true randomization through physical processes that alter the binary of the data. This ensures that patterns cannot be detected or exploited by adversaries.


3. Integration With Existing Cryptographic Systems

Secured2 does not require organizations to abandon their current cryptographic systems. Instead, it provides an additional, physics-based layer of protection that integrates seamlessly with existing frameworks. This dual-layer approach delivers two key benefits:


  1. Extended Lifecycle: By combining physics-based security with traditional cryptography, organizations can protect their data even if their encryption keys are compromised. Think of it as a defense-in-depth approach with dual layers.

  2. Post-Breach Resilience: Even in the event of a breach, shredded data fragments are indecipherable, rendering the attack futile and wasting the time of hackers who think they can break something only to find they can't.


4. Testing and Validation

Secured2’s technology has undergone rigorous testing by some of the world’s most demanding agencies, including the NSA and FBI. Here are key highlights of our validation process:


  • Randomizer Testing: Passed NSA-level randomization tests, proving our shredding and randomization methods are unbreakable.

  • Top Secret / Classified Data Testing: Currently Secured2 is undergoing evaluations for top-secret & classified data applications, having already passed initial phases with flying colors.

  • Compliance with Existing Standards: While our technology surpasses the limitations of NIST’s PQC standards, it is designed to coexist with existing cryptographic frameworks, ensuring smooth adoption. So we will meet current standards while providing a layer of protection that 'guarantees' security due to the physics nature of our modality.


5. The Future of Secure Data: QuantaMesh Networking

There is no question Secured2 is leading the charge to our secure future by creating an end-to-end secure solution. This technology leverages physics-based security principles to build a more robust, provable and secure underpinning to our digital world. From Authentication, transport to at-rest storage. Secured2's solution extends across these functions to deliver the most robust security in the market today.


I encourage you to explore how Secured2 can protect your organization’s most valuable asset: its data. Let’s move beyond incremental fixes and embrace a future where security is grounded in the immutable laws of physics.


Author: Daren Klum, Co-Founder Secured2

8 views0 comments

Recent Posts

See All

Commentaires

Noté 0 étoile sur 5.
Pas encore de note

Ajouter une note
bottom of page