HyperCrypComm

The World’s Strongest Encrypted Communication Network

Initial Coin Offer

 

White Paper

  

 

Copyright 2017 HyperCrypComm

Baarerstrasse 10,

Zug, Switzerland

 

Index

 1. Executive Summary

 2. Who is HyperCrypComm For?

I) Financial Industry

II) Global governments

III) Military/security forces

IV) Medical field

V) Private Individuals

 3. Encryption Technology

 4. How Does HyperCrypComm Work?

 5. HCC Token Sale

 6. Team

 

1. Executive Summary

 Cyber-security will continue to be of primary importance for both businesses and private citizens. With the increasing cases of litigation filed against commercial businesses involved in cyber-security breaches, there is a significant level of potential for services that can ensure safety and security.

 Already, billions of dollars are spent on cyber-security, this will continue to increase as a growing share of data increases the requirement for safe networks. In 2016, $73.7 billion was spent on cyber-security, with this amount estimated to increase to 101.6 billion by 2020, according to International Data Corporation[1].

 "Today's security climate is such that enterprises fear becoming victims of the next major cyber attack or cyber extortion," said Sean Pike, IDC's vice president of security products, in a statement. "As a result, security has become heavily scrutinized by boards of directors demanding that security budgets are used wisely and solutions operate at peak efficiency."[2]   

In a report by PwC, they stated that cyber-crime is the 2nd most reported economic crime affecting 32% of organizations[3].

Communication networks are of key importance for business users. HyperCrypComm (HCC) is in the process of building the world’s most encrypted, secure communication network. Furthermore, in addition to the security of encryption during the transmission phase, HyperCrypComm has measures that prevent the storage of information transmitted, creating the ultimate in security and privacy.

2. Who is HyperCrypComm For?

Any entity or person that requires the ultimate in security.

Our initial target market is in the field of the financial industry, global governments and military/security forces, although anyone can use this network.

i) Financial industry – the financial sector generated in excess of $536 billion, according to the world bank in 2015[4]. The cost of cyber-security spending by the financial industry will also continue to grow, with perhaps even a higher rate of growth than other industries considering the sensitive nature of the work performed.

We believe that the financial industry is one of many industries that will adopt the HCC standard for all communication networks globally.

HCC is currently in negotiation with numerous financial firms located in the U.S., Europe, U.K., Asia, Eastern Europe, South East Asia and Latin America. The financial firms include many sectors, from insurance, banking and investment institutions.

 ii) Global governments – governments have a large and growing requirement for secure communication networks, along with cyber-security protection in general. HCC is in discussion with numerous governments around the world. Due to the fact that the technology is so advanced, and can also be certifiably eliminated, this alleviates security concerns for even the most sensitive and secure information.

iii) Military/Security Forces – funding is not an issue for these global institutions. The U.S. military alone will spend $6.7 billion on addressing cyber-security threats in 2017[5]. When one considers other security forces both within the U.S. and globally, we estimate the spending on cyber-securtity could exceed $100 billion in 2017. Communication networks are of crucial importance to this industry, we expect uptake of the HCC standard for many, if not all, global military and security forces. Negotiations are under way with several global military forces.

 iv) Medical field – the rising concern over medical records is a real issue, one that will continue for decades. Using the HCC standard for the communication network of a medical provider will help mitigate litigation risks from a compromised network.

 v) Private individuals – while many people are comfortable with little security precautions, we believe this will come to an end with ever greater cyber-security breaches. Specifically, groups such as wealthy individuals and corporate executives, along with politicians, take their security very seriously. Even average individuals are beginning to take precautions and ensure the safety of their information. We expect this to continue for the foreseeable future.

 

  1. Encryption Technology

 

It is important to understand the technology behind communication encryption. Scrambling data to make it unreadable, and then placing it back together properly is a very simplistic idea of what is involved in encrypting a message.

 

Triple DES is an example of a modification and enhanced version to the Data Encryption Standard. Once the Data Encryption Standard was hacked, the new Triple DES was created to increase security through a higher requirement in computational power to decrypt a message. The RSA is an asymmetric algorithm, unlike the Triple DES, as there is both a public and private key. 

 

The next level of encryption security is Blowfish and the successor Twofish. Both of these algorithms split a message into blocks of bit and encrypt them, 64 bits in the case of Blowfish and 256 bits for Twofish. Twofish is certainly a decent encryption algorythm, but far from perfect.

 

The US Government currently utilizes the Advanced Encryption Standard (AES). AES can run using 128, 192 and 256 bit keys, making it flexible and relatively strong. This too is not the perfect system and can still be breached.

3. How Does HyperCrypComm Work?

The HCC algorithm takes the best of what is available now and incorporates blockchain technology to enhance security of communication networks to a level that leaves it impenetrable.

HCC utilizes computation from multiple parties, distributing data queries through various nodes. Each node has a portion of the data. The HCC protocol provides the link to access the data through the nodes in the correct order. To further increase security, if a hacker were to try and place the data in order, any incorrect step will lead to data that is not part of the original data set on purpose – a modified Honey Encryption method.

For further security, the HCC algorithm also has an intrusion detection system built if for all users. If the system detects a malicious attack, there will be a warning to all user of the HCC algorithm, along with a proprietary defensive investigation.

The sender of a message using the HCC algorithm  is assured that only the receiver can access the message, and that any malicious attempt to decrypt the message will not be possible through

The details of the HCC algorithm are highly sensitive and are restricted to interested parties who would like to test the system, specifically government agencies or financial institutions. Due to the sensitive nature of the algorithm, only verified parties will be allowed detailed information regarding the specifics of the HCC algorithm.

Security is of the primary important for users of the HCC algorithm.

4. HCC Token

The HCC Token will be used for authentication purposes and for network access. Furthermore, the HCC Token can be used for sending money transfers within the HCC system.

This unified HCC token will ensure security, safety for all users of the system.


There will be a hard cap of $400 million. Only ether will be accepted, 1 ether for 10 HCC tokens.

5. Team

HyperCryptComm is led by the following team:

David Cameron

David has been involved in cyber-security and encryption technology for over a decade. He was instrumental in developing encryption technology and holds an MBA from Harvard, and Master’s and Bachelor’s degrees in Electrical Engineering and Computer Science from MIT, where he attended on scholarship.  

Bolin Chan

 Wan oversees development and engineering solutions. As a long-standing software architect and security researcher, Wan has extensive experience actively protecting enterprise- class networks from unwanted access.  His specialty is developing security and encryption technology for network communications. Wan holds a Bachelor’s degree in Computer Science and a PhD in Computational Science and Engineering from MIT.

 [1]Worldwide Semiannual Security Spending Guide, International Data Corporation, 2016

[2]Ibid

[3]“Global Economic Crime Survey 2016”, PwC

[4]The World Bank, Data, Financial Sector

[5]Department of Defense, Budget Fiscal Year 2017

 
 

Site Name