BitMint Financial Language writes money the same way in your e-wallet, and in your checking account; you move your money to your phone where it behaves like cash, and you deposit it in your bank account where it is payable through the bank. Convenient, Secure. That is the advantage of the BitMint Financial Language. It is the simplest way to write money so that like the dollar bill, it has a value and it has an identity. …


AI Assisted Innovation: The Grand Vision for a Better World

We dig ourselves out of holes and extend our reach way and beyond on the power of human innovation. Had we managed to accelerate our innovation we would reach the promised land a day earlier. But we can — a carefully crafted methodology now identified universal patterns for the innovation process, and used these patterns as raw feed into a strong AI engine, powered by deep supervised and unsupervised learning that works like a co-innovator for the human innovator. Imagine a smart cohort to discuss with what you are trying to solve, find, build right now? What a productive dialogue…


Can a finite key offer unlimited mathematical security — Circumventing Shannon’s Proof?

Claude Shannon proved that perfect security is achievable for plaintext no longer than the encryption key. But there appears to be a way to circumvent this theoretical limitation with great cryptographic consequences

Claude Shannon referred to a key, the information in which, KI, was used to convert a plaintext to a ciphertext. But what if the shared key, Ks, is first used to derive another key a ‘derive key’, Kd. And Kd is used to encrypt a plaintext P to a ciphertext C:

C = Enc(P, Kd)

And what if there are infinite number of keys K1, K2, ….. that…


Breaches, Breaches, Breaches — The Unrecognized Cause

The centerpiece of cyber security is the communication between two coordinating parties sharing a symmetric key. They usually use AES, or a variant thereto. Unfortunately the resultant cyphertext hides in it the key that was used in generating it. The common wisdom is that no one is smart enough to excavate the key from the exposed ciphertext , so any and all secrets are transported over the Internet in the form of this committed ciphertext. Among them are access secrets used by hackers to impose a ransomware attack and massive theft of data.

The common argument in favor of the…


Central Bank Digital Currency — A Terrorist’s Point of View

Unfortunately a few of us, for all sorts of crazy reasons, do aim to destroy the global order as it is today. In the old days they required armies to march from place to place. With the advent of nuclear weapons, the challenge became considerably easier — by unleashing a few bombs the world will end up in ruins. The Coronavirus suggests an even easier man-made path for a global catastrophe. But all this pales by comparison to what’s to come.

Lo and behold the central banks of the world are migrating the wealth of humanity into crypto currencies. In…


How many times did you read the term “superposition”, “entanglement”, and “decoherence”? The more you read, the greater the mystery. Do you get the suspicion that quantum mavens enjoy your bewilderment?

The naked truth is that quantum physics, unlike Newtonian physics, is a humble one. Newton told us what is going on. A quantum physicist says: I am absolutely clueless about what is going on. I have past measurements, and all I can do is to assign probabilities to possible future measurements. What happened between measurements is a persistent mystery, used to confuse the casual reader.

Yes, quantum computing is…


In the current crypto paradigm a single secret key transforms a plaintext into a ciphertext and vice versa, or at most a different key is doing the reverse action. Attackers exposed to the ciphertext are hammering it to extract that single key and the plaintext. This paradigm is now facing an alternate setup: using a particular crypto algorithm, there are infinite number of keys that are perfectly interchangeable — each has the same effect. Despite the fact that there are infinite number of them, they are still hard to find. And unlike regular cryptography, the best that you can hope…


Everything you are busy innovating right now is similarly attracting innovators from around the globe. People you never heard of wrestle with the very same innovative challenge you rub your own brain against. There is an invisible competition of wit and creativity, where the clock is the final arbiter.

To hold your own in this race, you better make good use of the new application of artificial intelligence: partnering with your creativity to accelerate your drive on the innovation highway. Stay ahead!

Artificial Intelligence Assisted Innovation — AIAI — builds for you an innovation framework, casting in your favor reams…


Cyber Security Overconfidence suppressed use of Effective Recovery Technology that would have minimized the yet to be appraised colossal damage from the 2020 successful invasion of US Cyber territory

The fundamental feature of stored data is that it can be read without leaving a trace. Every custodian of data has to admit the following simple premise: an adversary with sufficient imagination will mark a pathway to the protected data. If the data custodian was equally imaginative to block this pathway, then the intruder will simply imagine another access scenario, and a third, until one such hacking procedure will exceed the…


All mainstay ciphers are based on complexity theory which concerns itself with general statements, proving, for example, threshold complexity for hardest case and average case. Alas, the keyspace used in every such cipher may contain hidden weak keys for which the cryptanalytic computation is sufficiently limited. Weak keys are like “Zero Days vulnerabilities” for operating system. They are vigorously chased and well-hidden by those who spot them. They pose a daunting cloud on modern day security. This threat is unbound. Another weakness may always be found. Fortunately modern technology offers a means to totally wipe out the threat of weak…

BitMint - AI Powered Cyber Innovation

AI powered innovation. Quantum Cyber. Digital Money. Cyber Chemistry. 23 Patents and counting.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store