Smart key using remote synchronization function
Crypto Limited group provides key technical products which are the applications of "Complete Cipher" that NTI inc. successfully completed for the first time in the world.
【 CCP wallet prototype release 】
CCP wallet prototype v.1.0 was announced to be released at the end of September.
The application of the prototype works on the Android OS (v.10 or higher) and will be downloaded for US $ 200 / wallet on an application / approval basis.
【 Information on application for participation
in the CCP wallet prototype test 】
As previously announced, the CIPHC wallet app prototype Android version will finally be released at the end of this month.
If you would like to participate in the test, please apply from the following link.
The RI-IS secretariat will return to you with payment information.
The test fee is $ 200 per account when the payment will be made by credit card and 22,000 JPY by bank transfer.
Bank transfer: 22,000 Japanese yen
Card payment: US $ 200 (card company payment rate)
Your participation will be welcomed.
【 Future roadmap of CCP wallet】
CCP wallet v.1.0 is planned to be released by the end of this year.
Prototype testing continues until the end of December 2021.
Download of CCP wallet v.1.0 will be available on Google Play store From January 2022.
Multiple field tests are planned to be made from January 2022.
4 Major Threats of Information Security
There are four major threats to information security, which are information theft, falsification of information, and spoofing in addition to cyber attacks. All of 4 threats can be protected only by "complete cipher".
Cryptographic technology consists of encryption algorithms and encryption keys since Greek era. In order to strengthen the encryption, it is conceivable to
(1) make the encryption algorithm more complicated or
(2) increase the number encryption keys.
However, even if the method (1) or (2) is extremely successful, it is impossible to create a cipher that cannot be deciphered. Most of the current cryptographic technologies are based on what a huge amount of computation is necessary to decipher and it is the fact that it cannot be said that it is never decipherable. Therefore, when the performance of the computer improves, the possibility of being deciphered increases, so it is necessary to use more complicated encryption algorithms or to increase the number of encryption keys by lengthening the encryption key length.
In the quantum computing era of the near future, cryptographic technologies which are theoretically undecipherable are required.
The answer to this challenging problem in this human history is the encryption scheme devised in 1918 by Gilbert Sandford Vernam (1890 - 1960) who worked for AT&T, and in 1949 Claude Elwood Shannon (1916-2001) proved it undecipherable under certain conditions and this algorithm is called Vernam cipher or one-time pad.
As a result, for the complete cipher, only Key Transfer Problem had been the last remaining issue until NTI Inc. solved.
Traditional block chain type token/coin platform has been subjected to repeated improvements, but it is known that structural defects cannot be overcome, and what is drawing attention as the most promising candidate that can solve this problem fundamentally is a Cipher Core Platform which is being developed by using crypto cash technology.
Medical Cloud Intelligence Project
Medical Cloud Intelligence is a system that supports the optimal diagnosis and prescription under full security by integrating the expertise of medical doctors and other experts in real time.
Conventionally credit service, debit service, and prepaid service definitely require dedicated communication lines and dedicated readers. 6-pay is a 6 digit number system, which realizes same services without those special lines or readers at all.
IoT where the Internet is expanding and everything will be connected, is about to come. The technology of remote authentication each other is considered to be the most important, and it is realized only by modern cryptography that changes from moment to moment due to the instantaneous key. This fully remote authentication technology DynaCrypto not only provides a remote authentication system that protects even against man-in-the-middle-attack, but also dynamic my number system and smart key system with variable element authentication. Furthermore, it provides a remote authentication system for connected cars (autonomous driving vehicles) and for smart grids.