FES
Contents
FES Fractal Encryption Standard Standardised Fractal Transformation to replace AES
FES Security and Performance Industrial strength Quantum Safe encryption
FES Impenetrability A World-First in cryptography
Fractal Infinities Infinity is not just a very big number
Quantum Safe Standard A global imperative

FES Fractal Encryption Standard

The FES Fractal Encryption Standard is a standardised specification of Fractal Transformation engineered to replace quantum vulnerable AES encryption.

FES is designed and engineered to provide a consistent interface, algorithm and defaults to streamline AES encryption replacement.

Your application becomes quantum safe when you implement an FES component to encrypt data.

Combine FES with NIST quantum safe RSA replacements for a one-time quantum safe migration.

Quantum safe FES replaces AES as the future-proof encryption standard.

FES Security and Performance

FES introduces a revolutionary approach to encryption based on the infinite complexity of fractals. Unlike traditional encryption, which relies on fixed key sizes and deterministic mappings, FES operates on principles that make it fundamentally resistant to quantum and classical attacks:

  1. Infinite Key-Space:
    FES uses configurable fractal dimensions, each adding 104 bits of key-space. A typical implementation starts at 832 bits—over three times the size of AES-256—and can scale indefinitely.
  2. Fractal-Based Transformations:
    FES replaces the static operations of traditional encryption with dynamic fractal iterations. Each fractal stream is deterministic in computation yet unpredictable in its output, making it impossible for attackers to reverse-engineer the process.
  3. Industrial Strength Performance:
    Rigorous benchmarks demonstrate that FES is not only quantum-safe but also fast. Recent upgrades have brought performance within striking distance of AES, with processing speeds projected as low as 0.05 seconds per megabyte on standard hardware. Hardware embedded FES is predicted to reach or exceed AES hardware performance parity.
  4. Unmatched Impenetrability:
    Even with the world’s most powerful quantum or classical computers, FES’s fractal navigation and transformation processes make it impenetrable. Without the exact fractal stream, payloads cannot be reassembled.

FES Impenetrability

Impenetrability is a World-First in cryptography.

FES delivers impenetrability by way of:

  1. Fractal Iteration and Navigation:
    FES encrypts data through sequential fractal navigation, where each state depends on the previous one.
  2. Infinite Key-Space:
    A configurable key-space starts at 832 bits for 8 dimensions and extends infinitely with additional dimensions.
  3. Shift Register Obfuscation:
    Introduces entropy distribution across transformations, masking fractal output.
  4. Non-Reversible Fractal Streams:
    Payloads are encoded/overwritten within unique, unpredictable and infinitely complex fractal streams that cannot be reverse-engineered.

Impenetrability has been the cryptographic holy grail for securing sensitive data across digital systems. Traditional encryption schemes like AES (Advanced Encryption Standard) rely on the massive computational cost required for brute-forcing keys in a classical computing environment. However, with the advent of quantum computing and advanced GPUs, the landscape of cryptographic security has fundamentally shifted.

Fractal Encryption Standard (FES) represents the next generation of cryptographic algorithms, offering unprecedented impenetrability by leveraging the infinite complexity of fractals and dynamic, non-deterministic processes.

FES ciphertext is a fractal artifact, the payload no longer exists in the ciphertext in any form. The payload can only be reconstructed with the exact fractal stream.

The key used to transform the payload plays no part in the transformation process, FES breaks classic key→payload→ciphertext determinism. No key based attack is viable.

It is computationally infeasible to explore the infinite number of possible fractal streams that FES can generate. As fractal stream generation is a precise sequential process, each iteration depending on the unpredictable outcome of the previous iteration, it defeats the parallelism of GPU and Quantum Computers.

FES Impenetrability is a fact.

The future of data security is fractal. The future is FES.

Fractal Infinities

A core enabler of FES impenetrability is integration of infinite complexity by way of the Mandelbrot Fractal.

Some observations about infinity and infinite complexity:

  • Infinity is unbounded
  • Infinite complexity includes all possible unique patterns in any number of dimensions
  • There always remains an infinite distance between the finite and the infinite
  • Infinity is beyond binary or decimal representation
  • Infinite complexity is accessible by finite means
  • Mandelbrot functions access infinite complexity

Infinity is not just a very large or small number, it cannot be computed. Given any very large number, say a Googol squared, infinity is still infinitely larger.

Similarly infinite complexity is not just 'very complex'. Given any level of complexity, say the infinitely long and unique decimal sequences for PI or PHI, infinite complexity is infinitely more complex.

The Mandelbrot fractal has been mathematically proven to be Infinitely Complex by mathematician Mitsushiro Shishkura (Proof).

Quantum Safe Standard

The Urgency to Adopt a Quantum Safe Encryption Standard

The world stands at the precipice of a new era in cybersecurity, driven by current capabilities and rapid evolution of quantum computing. This technological revolution threatens to unravel the cryptographic foundations underpinning every facet of digital security, from financial transactions to healthcare data, government secrets, and personal communications.

<strong>The Quantum Threat</strong>

Quantum computers, unlike their classical counterparts, excel at solving specific problems that are currently deemed computationally infeasible. Shor’s algorithm, in particular, poses a catastrophic threat to traditional encryption systems:

  • RSA and ECC (Elliptic Curve Cryptography): The asymmetric encryption schemes that form the backbone of internet security are mathematically reduced to solvable problems by quantum algorithms.
  • AES and Symmetric Encryption: While theoretically more resistant due to Grover’s algorithm, AES relies on computational difficulty that fails to maintain security in a post-quantum world.

Cryptographically relevant quantum computers are no longer a distant hypothetical; they have existed since 2022. Governments, corporations, and bad actors are racing toward quantum supremacy, with current encryption systems data ready to be decrypted (Flatow's Algorithm).

<strong>The Inevitability of Change</strong>

Despite the clear and present quantum threat, there has been a striking lack of urgency in adopting quantum-safe standards:

  1. Complacency in Industry: Many organizations continue to rely on legacy systems, assuming they will have time to adapt. This ignores present quantum computer capability to instantly explore 256 qubit key-space with deterministic block algorithms.
  2. Lack of Standards: Current efforts, such as NIST's Post-Quantum Cryptography (PQC) initiative, remain focused on developing and evaluating RSA and public key algorithms. However, no quantum safe AES and symmetric key replacement candidates exist.
  3. Misplaced Trust in AES: Claims that AES with larger keys (e.g., AES-256) is quantum-safe overlook fundamental weaknesses in classical cryptographic principles, especially when brute-force and heuristic attacks exploit the single-solution nature of traditional ciphers.
<strong>The Role of FES (Fractal Encryption Standard)</strong>

FES emerges as the most viable candidate for replacing AES and ensuring data security in the quantum era. Its unique design principles directly address the vulnerabilities of current systems:

  • Infinite Complexity: The fractal iteration model introduces layers of unpredictability that quantum computers cannot navigate due to their sequential dependence.
  • Unbounded Key-Space: Configurable dimensions allow FES to dynamically expand key-space, scaling security indefinitely.
  • Future-Proof: Unlike AES, whose key sizes and block structures are fixed, FES adapts to advancements in computational power by modifying its fractal navigation dimensions.
<strong>The Call to Action</strong>

The urgency to adopt FES or a similar quantum-safe standard cannot be overstated. Consider the following:

  • Economic Impact: A single breach of encrypted financial systems could destabilize global markets, resulting in trillions of dollars in losses.
  • National Security: Defense communications, critical infrastructure, and classified information are prime targets for quantum-enabled adversaries.
  • Consumer Trust: The loss of privacy and trust in digital systems would erode public confidence in everything from e-commerce to healthcare.
<strong>A Window of Opportunity</strong>

The transition to quantum-safe encryption is not merely a technical challenge—it is a global imperative. Governments and industry leaders must act decisively:

  1. Mandate Quantum-Safe Standards: Regulatory bodies must prioritize the adoption of quantum-safe encryption in critical sectors.
  2. Incentivize Research and Adoption: Investments in quantum-safe technologies, such as FES, must be accelerated to ensure widespread availability and implementation.
  3. Public Awareness: The public must be educated on the quantum threat and the steps being taken to secure their data.
<strong>Conclusion</strong>

FES represents a turning point in cryptographic history, offering a path to secure the digital world against both classical and quantum threats. The time to act is now. By adopting FES as the global encryption standard, we can protect the foundations of our interconnected world and build a future where security is not a fleeting promise but an enduring reality.

FES is the prime candidate to be adopted as the Quantum Safe Encryption Standard.



FES Components
FES Demonstration
Licensing
Impenetrability Proof
scroll to top of page