CORA is Quantum-Safe TODAY

Quantum Computers will not break CORA!

What is needed to read the encrypted (CORAfied) data?

  • The MUP (encryption key).
    • CORA encryption keys (MUPs) vary in size.
    • Unlike other forms of encryption in which each key is the same size, CORA is probabilistic and varies just about everything including the length of the keys.
    • MUPs are more than 1 million bits long; nothing compares to CORA.
    • The MUP is dispersed and only exists as a complete key 'in memory'.
  • The catalog.
    • Connects the CORA blocs with the readable data.
    • Centrally controlled.
  • The CORA blocs.
    • CORA is a distributed solution.
    • The number of CORA blocs varies.
    • Each CORA bloc is needed without exception and without.
    • Each byte in each bloc must be exact; there cannot be any modification what so ever.

make the hack irrelevant