How CipherLoc “Future Proofs” Encryption. The below diagram and high-level protocol steps are from CipherLoc’s materials at their website. We found it worthwhile to repost here, with appropriate links back to the provider, CipherLoc.
Security strength can be vastly improved via a variety of easy-to-deploy techniques:
1) Randomize the types of encryption algorithms used (i.e. use additional ciphers other than just AES)
2) Increase the number of fragments generated
3) Re-encrypt each fragment multiple times – and with different encryption algorithms
Even if quantum computing manages to “break” an individual fragment, no information is obtained about the other fragments or their ordering.