░▒▓██████▓▒░░▒▓██████▓▒░░▒▓███████▓▒░ ░▒▓██████████████▓▒░ ░▒▓█▓▒░ ░▒▓███████▓▒░ ░▒▓██████▓▒░
░▒▓█▓▒░ ░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░ ░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░
░▒▓████▓▒░ ░▒▓████▓▒░ ░▒▓███████▓▒░ ░▒▓█▓▒░░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░ ░▒▓███████▓▒░ ░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░ ░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░ ░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░ ░▒▓███████▓▒░ ░▒▓██████▓▒░
$> unbreakable encryption technology
%> PoT tested with NIST SP 800-90B
?>
....................................................................................................
╔════════════════════════════════════════════════════════════════════════╗
║ OBJECTIVE> Develop and commercialize innovative and unbreakable ║
║ encryption systems based on true physical entropy hardware ║
║ and sophisticated software. ║
╚════════════════════════════════════════════════════════════════════════╝
CORE TECHNOLOGIES:
> tQRNG hardware == true Quantum Random Numbers Generators
└─ Generating up to 1 Gbits/sec of random digits for encryption
> HARD software == Hidden Among Random Digits
└─ Disruptive encryption algorithm inserting messages into random bit streams
> QEST software == Quantum Entropy Simplified Transcriber
└─ Applied to HARD scheme allows for FULLY HOMOMORPHIC ENCRYPTION
....................................................................................................
╔═════════════════════════════════════════════════════════════════════════════════╗
║ ! WARNING: CRITICAL VULNERABILITIES DETECTED ║
╠═════════════════════════════════════════════════════════════════════════════════╣
║ ║
║ > Common encryption methods are based on numerical algorithms ║
║ ║
║ > Due to AI and quantum computers, existing ciphers require longer keys ║
║ ║
║ > More CPU and time needed for encryption ║
║ ║
║ > Existing methods are not useful for IoT and for encrypting large sets of data ║
║ ║
╠═════════════════════════════════════════════════════════════════════════════════╣
║ Fewer than 50% of servers and cloud data are protected by secure encryption ║
╠═════════════════════════════════════════════════════════════════════════════════╣
║ Fewer than 2% of data on home devices and IoT is encrypted ║
╠═════════════════════════════════════════════════════════════════════════════════╣
║ ║
║ SOLUTION REQUIRED: Post-Quantum Cryptography (PQC) innovations ║
║ ║
╚═════════════════════════════════════════════════════════════════════════════════╝
....................................................................................................
╔═══════════════════════════════════════╗
║ ▓▓▓ HARD ENCRYPTION ║
║ ║
║ Inserts message into random bit ║
║ stream from tQRNG ║
║ Does not use mathematical functions ║
║ that AI can break ║
╚═══════════════════════════════════════╝
╔═══════════════════════════════════════╗
║ ▓▓▓ SCALABLE DEVICES ║
║ ║
║ Integration into IoT, PCs, and ║
║ server networks ╚═══════════════════════════════════════╝
╔═══════════════════════════════════════╗
║ ▓▓▓ CPU EFFICIENT ║
║ ║
║ Highly secure and easy to use ║
║ processes ╚═══════════════════════════════════════╝
╔═══════════════════════════════════════╗
║ ▓▓▓ HIGH ENTROPY ║
║ ║
║ Resulting cipher resembles random ║
║ numbers ║
║ Can be visualized as high-entropy ║
║ graphics ╚═══════════════════════════════════════╝
╔════════════════════════════════════════════════════════════════════════════╗
║ INFO> Cryptography is all about maximizing the disorder (entropy) of ║
║ ciphers ║
║ ║
║ > FERMIBO's tQRNG use the process of beta decay in 3H (tritium) to ║
║ generate random numbers continuously ║
║ ║
║ > Advanced, tritium-based PoT (Proof of Technology) tQRNG can generate ║
║ high-quality random numbers at speeds ranging from 1 Mbps to over 1 Gbps ║
║ ║
║ > tQRNG are being developed in collaboration with MB Microtech, a ║
║ Swiss company that has over 50 years of experience with and expertise ║
║ in tritium-based technology ║
║ ║
║ > tQRNG are easy to scale, to build into integrated chips, USB devices, ║
║ and blade servers for secure encryption ║
║ ║
║ > The quality of FERMIBO's PoT, which use tQRNG and NVIDIA hardware, ║
║ have been extensively tested using NIST SP 800-90B and other ║
║ industry tests, such as Dieharder and ENT ║
╚════════════════════════════════════════════════════════════════════════════╝
SECURITY • CPU/ENERGY EFFICIENCY • CONVENIENCE
╔═══════════════════════════════════════╗
║ [+] IoT COMPATIBLE ║
║ ║
║ Low-power CPU and IoT devices can ║
║ support coding and decoding ╚═══════════════════════════════════════╝
╔═══════════════════════════════════════╗
║ [+] HIGH EFFICIENCY ║
║ ║
║ High efficiency for streaming and ║
║ block encoding on servers ╚═══════════════════════════════════════╝
╔═══════════════════════════════════════╗
║ [+] SCALABLE SECURITY ║
║ ║
║ Longer keys do not increase ║
║ computational complexity ╚═══════════════════════════════════════╝
╔═══════════════════════════════════════╗
║ [+] SOFTWARE ONLY ║
║ ║
║ Decryption requires no hardware, ║
║ only HARD software and the key ╚═══════════════════════════════════════╝
╔════════════════════════════════════════════════════════════════════════════╗
║ POST-QUANTUM CRYPTOGRAPHY (PQC) ADVANTAGES: ║
╠══════════════════════════════════════════════════════════════════════════════╣
║ ║
║ ✓ Future quantum computers will not be able to break HARD ciphers ║
║ ║
║ ✓ 256-bit key creates 3.45×10^62 possible permutations to be analyzed ║
║ ║
║ ✓ HARD is FHE in combination with QEST ║
║ ║
║ ✓ Protects sensitive data, including that of the underserved IoT sector ║
║ ╚════════════════════════════════════════════════════════════════════════════╝
....................................................................................................
STATUS> OPERATIONAL
╔═══════════════════════════════════════════════════════════════════════════╗
║ [✓] Advanced version of the PoT has been built and tested ║
║ └─ Optimized software for high-efficiency random bits extraction (up ║
║ to 1 Gbps) ║
║ ║
║ [✓] HARD software, when combined with QEST, supports the encryption ║
║ for FHE on both Linux and Windows platforms ║
║ ║
║ [~] Jetson ORIN NANO system is under development ║
╚═══════════════════════════════════════════════════════════════════════════╝
....................................................................................................
TARGET CUSTOMERS:
╔═══════════════════════════════════════╗
║ ┌─ LLM / AI ─┐ ║
║ ║
║ Data security for AI creators & users ║
╚═══════════════════════════════════════╝
╔═══════════════════════════════════════╗
║ ┌─ CLOUD SERVICE PROVIDERS ─┐ ║
║ ║
║ Cloud data storage and streaming ║
╚═══════════════════════════════════════╝
╔═══════════════════════════════════════╗
║ ┌─ BANKS & FINANCIAL ─┐ ║
║ ║
║ Records and blockchain protection ║
╚═══════════════════════════════════════╝
╔═══════════════════════════════════════╗
║ ┌─ HEALTHCARE ─┐ ║
║ ║
║ Protecting patients' clinical data ║
╚═══════════════════════════════════════╝
╔═══════════════════════════════════════╗
║ ┌─ DEFENSE INDUSTRIES ─┐ ║
║ ║
║ All communication security ║
╚═══════════════════════════════════════╝
╔═══════════════════════════════════════╗
║ ┌─ AUTOMOTIVE INDUSTRY ─┐ ║
║ ║
║ Keyless entry and OTA updates ║
╚═══════════════════════════════════════╝
PRODUCT OFFERINGS:
╔═══════════════════════════════════════════════════════════════════════════╗
║ > Integrated chips for IoT, automotive, and home security industries ║
║ ║
║ > Peripheral USB devices for PCs used by banking and healthcare clients ║
║ ║
║ > PCI cards for servers: Google, AWS, Microsoft, Oracle, Meta, etc. ║
║ ║
║ > Combined solution for military and defense industries ║
╚═══════════════════════════════════════════════════════════════════════════╝
╔══════════════════════════════════════════════════════════════════════════╗
║ TIMELINE> FERMIBO will start building contacts with potential clients ║
║ in a few months and intends to use PoT for demonstrations ║
║ ║
║ TARGET> Commercial MVP delivery within 2 years ║
╚══════════════════════════════════════════════════════════════════════════╝
....................................................................................................
╔═══════════════════════════════════════════════════════════════════════════╗
║ ▓ HARD is a superior encryption method based on physical entropy ║
║ └─ Has been thoroughly tested ║
║ ║
║ ▓ QEST is a software that, when used with hardware, enables ║
║ fully homomorphic encryption ║
║ ║
║ ▓ FERMIBO's devices are based on tQRNG technology ║
║ └─ Produces consistently high-quality random numbers ║
║ └─ Contains embedded software that supports all encryption needs ║
║ ║
║ ▓ The entire solution is based on NVIDIA Jetson technology ║
║ ║
║ ▓ FERMIBO will deliver a commercial MVP within 2 years ║
╚═══════════════════════════════════════════════════════════════════════════╝
....................................................................................................
....................................................................................................