Replacing the Blockchain


The purpose of this company is to use an architectural secure system to replace the Blockchain technology and to provide a more secure, data-centered, scalable, energy-efficient, and quantum-resistant platform for cryptocurrency, central bank digital currency, Internet of things, cloud computing, Web3 platform, financial decentralization, autonomous vehicle, robotics, AI security, medical industry, and many more industries.


The founder played with an AES Matlab code using FPGA, which is a hardware device verifying function for algorithms, in 2003 when NIST was trying to decide the next decades’ standard for cryptography algorithms. He came up with the idea of using thousands of thousands of keys to encrypt a file instead of using one key. The first patent “Fast Key-Changing hardware apparatus for AES Block Cipher”, US 8509424, was issued in 2013.


01/09/2009 Satoshi Nakamoto published his first version of Bitcoin. The founder was afraid that the USPTO would reject his first patent application. So he did a deep research on Blockchain technology. He discovered the Blockchain could be a great competitor, yet the Blockchain is a chain and uses a key to control block computation, which is different from his design. Blockchain also exists lots of weaknesses, such as key breaching, slow chain processing, and energy consumption issue. So the founder kept working on his whole security system design.


The founder once tried to commercialize his first patent and discovered that market needs a system-wise security solution, which covers all ‘surfaces’, instead of a partial solution. The founder also remembers the creator of RISC, David Paterson, who once said that the creator of computers did not think of security issues at the beginning. He then realized in order to protect digital Cyberspace (computer systems, Internet communication, etc.), it is necessary to design security from the vey badic computer hardware architecture. Therefore a hardware security as opposed to software security concept was formed.


The second patent was issued on 4/08/2021, US 10972256, a computing architectural secure system, which composes of an identity authentication management subsystem (IAM), a fast key switching parallel processing crypto-engine, a special operating system scheduler, a special data structure that includes a data distribution list, and heterogeneous processors. This system provides data creator the ability to control data accessing, such as READ, WRITE, MOVE, COPY, or PRINT, etc. A user needs to be verified with his real identity before he is allowed to access a file. Data is encrypted all the time, whether it is in memory or on mobile. Data will be self-destroyed if a user uses brute force, such as a quantum computer, to decipher a file.


It is a surprise that Blockchain technology was so hot starting from 2021 among research institutions, financial institutions, governments, and big technologies like Alphabet, BlackRock, and Morgan Stanley. These companies all invested more than $1 billion in R&D with Blockchain technology. Central banks worldwide tried to use Blockchain technology to facilitate publishing their digital currency (CBDC), yet without conclusion. $ 50 trillion business was bet using Blockchain technology to support the supply chain. It sounds the Blockchain technology has an unlimited future.


According to Chainalysis, Blockchain technology messed up $ 14 billion in 2021, and SlowMist reported $ 3.78 billion lost in 303 hacks in 2022. 3/23/2022 Ronin network lost almost $ 600 million just because all its 5 cryptographic keys were compromised. Using a key or password to protect data security is not safe.


There is no key management with the designed revolutionary computing architectural secure system (CASS). Traditional security systems use physical unclonable function (PUF), quantum key distribution (QKD), or a Hardware security module to secure a key. Yet at the final stage, all three methods need to generate a key to decrypt a file, and that is the point where a hacker gets the opportunity.


CASS embeds a cryptographic key seed in its message and the message is encrypted all the time. A file is encrypted and decrypted in an application-specific integrated circuit (ASIC) where nobody could retrieve or monitor data from this hardware, as opposed to software-oriented Blockchain technology. CASS’ encryption and decryption processes are in parallel, as opposed to sequential processing in the Blockchain. A file is encrypted with thousands of thousands of keys as opposed to a single key in many traditional security systems. CASS uses an identity verification and authentication module (IAM), which is embedded in every device, to control file access. The IAM communicates with each other throughout the Internet, which forms a subsystem, updating identity information in real-time. The identity information is user's biometrics plus another sensor variable, which changes and updated from time to time. Thus, data in CASS is controlled by its creator, and the system is a decentralized platform that provides Web3 requirements. CASS is quantum resistant facing post-quantum generation.


CASS is solutions for the proposals described in this IEEE paper, which described future internet and cybersecurity. Funder has discussed detail solutions with the first and second author at different scenarios.


The funder is searching for cofounder(s)/partners to commercialize this CASS. The plan is to start up an R&D laboratory and later partner with new startup companies or incubators. Some investors estimated that this project needs a couple of hundred million dollars and several founders. Founder has been offered $1 million - 5+ billion investment, but couldn't accept it right now.