Home // International Journal On Advances in Security, volume 11, numbers 1 and 2, 2018 // View article


Seven Steps to a Forever-Safe Cipher - (An Introduction to Poly-Substitution Encryption)

Authors:
Julian Murguia Hughes

Keywords: cipher; poly-substitution; unconditional security; perfect secrecy; inifinite computational power; quantum-resistant; cryptography; secrecy; unbreakability; privacy; encryption; quantum; computing; resistant; data.

Abstract:
All cryptography currently in use is vulnerable to an attacker with enough computational power and most of them will become obsolete once quantum computing becomes widely available. Continuing the current path seeking for more and more complex algorithms cannot guarantee neither secrecy nor unbreakability. Increasing the complexity while it keeps being vulnerable does not seem to be the right approach. Thinking outside the box is not enough. We need to start looking from a different perspective for a different path to ensure data privacy and secrecy. In this paper, we introduce Poly-Substitution encryption and share advances in searching for unconditional security instead of complexity and we try to light a path to a whole different cryptography based on simplicity and resistant not only to quantum attacks but also to what may come later, including attackers with infinite computational power.

Pages: 1 to 26

Copyright: Copyright (c) to authors, 2018. Used with permission.

Publication date: June 30, 2018

Published in: journal

ISSN: 1942-2636