The global proliferation of communication devices and the rapid expansion of the IoT means that privacy and sensitive data are more exposed than ever.
qVortex technologies provide the highest level of security at a fraction of the processor and power burdens required by other technologies.
We offer a fully secured future in all ecosystems, for everyone, on all devices
Who we are
A company composed of successful IT security experts, experienced business professionals, entrepreneurs, PhD researchers and highly experienced engineers specializing in developing algorithms and groundbreaking, innovative game-changing technologies.
What we do
Develop and implement various breakthrough, proprietary, cutting-edge technologies from the makeup of foundational encryption and compression. We enhance the way we all live, work, learn and communicate.
Offer exceptional performance improvements, while reducing overall infrastructure requirements and overheads. We are fully compliant with all existing industry standards.
Challenges facing the IT Security Industry
- Data, information and content security have become a top priority across industries and in board rooms
- Current global events have exposed today's security standards as vulnerable
- It is neccessary to keep up with the challenges of Quantum Computing
- The Industry demands for the development and implementation of better, new security measures
Security and privacy obstacles with information and data delivery
- All content produced, transferred and stored is exposed. Limiting this exposure it critical.
- A growing volume of data is created in or transferred to clouds, increasing vulnerability.
- Internet of things (IoT)
- Significant new innovations have spawned a new IoT ecosystem for the transfer data from smart homes and cities, medical/health facilities as well as fitness and diet tracking programs.
- IoT devices are almost exclusively small, with very low processing power, precluding current encryption standards.
- The proliferation of IoT devices for industrial, corporate and private use is creating massive security exposures. Each part of the ecosystem is evolving but not how we secure it.
Our low power usage and consumption allows qX Encryption to bring a new, higher level of security to the smallest devices of the IoT
qX Encryption seamlessly integrates within all existing industry standards
The lightweight components of our encryption provides for these advancements
Our code is lightweight and requires minimal processing power, while executing supreme levels of randomness
QVORTEX CL ENCRYPTION SPEED VS AES
QVORTEX ULTIMATE LIGHTWEIGHT ENCRYPTION
Qvortex is Quantum Ready!
It is scientifically proven that when it comes to quantum adversaries, two iterated block ciphers are more difficult to attack than one, where the most time-efficient attack has a worse time-space tradeoff than an exhaustive search. This shows that having access to quantum devices when attacking a double iteration of block ciphers can only reduce the time by an exponent of 3/2, rather than the expected quadratic improvement from Grover’s algorithm. In stark contrast to the classic adversary, a double iteration of block ciphers therefore restores security against quantum adversaries.
The combination of different encryption techniques allows qX to apply an arbitrary key structure, fully resistant to Quantum Computing challenges. qVortex hybrid ciphers adapts to attacks on the fly, even from the most advanced and sophisticated attackers.
It is scientifically proven that when it comes to quantum adversaries, two iterated block ciphers are more difficult to attack than a single one, where the most time-efficient attack has a worse time-space tradeoff than an exhaustive search. This work also shows that having access to quantum devices when attacking a double iteration of block ciphers can only reduce the time by an exponent of 3/2, rather than the expected quadratic improvement from Grover’s algorithm. Therefore, it can be concluded that, in stark contrast with the classical adversary, a double iteration of block ciphers could restore security against quantum adversaries.
Since quantum searches do not provide exponential speedups, symmetric key encryption like qVortex's CL is believed to be quantum-safe simply because the cipher can adapt to a quantum attack by increasing its key size in order to rectify a vulnerability introduced by quantum computing.
Consequently, even when a quantum computer is built, the CL symmetric encryption and hash function algorithms still put up a fair fight. Provided one uses sufficiently large key sizes, the symmetric key cryptographic systems of CL would already be resistant to attacks by a quantum computer.
qVortex Proprietary Technology Benefits
Technologies in Development
qVortex Technologies Inc has two additional ground breaking technologies under development:
a Compression Technology, and next generation Forward Error Correction.
We constantly update our site with the latest details and our progress to date.
qV compression will be an upgrade to basic MPEG-based video compression and will significantly reduce bandwidth requirements. This technology is in the R&D phase and when completed will seamlessly integrate and compress with existing CODEC standards.
Forward Error Correction
qV FEC is built on the foundation of our RNG and Hash algorithms. Unlike existing FEC, qV is based on rate-less codes, enhancing spectrum efficiency with an extended number of applications.