CORA redefines Encryption

Let's rethink... and redefine... encryption:

  • Other forms of encryption do not use Multiple Use Pads (MUP).
  • Have you heard of any current form of encryption that exceeds 2 kB (16,000-bit encryption)?
  • So, you think CORA must be slow. Think again! Being probabilistic in nature, CORA is fast since it doesn't have to do the numerous iterations that are necessary with limited, finite size keys.
  • Encryption uses "Blocks" to expand beyond the limits of their finite key. While mathematically brilliant, they are statistically limited compared to MUP, and prone to side channel attacks.
  • Encryption doesn't inherently use a distributed methodology. Block chains are an exception, however, Blockchains are a decentralized peer-to-peer implementation. This may be ideal for autonomous transactions, however, as a security solution it pales in comparison to CORA.

Please indulge use with a little bit of fun & rhetoric


verb |kohr-uh-fahy

  1. to encrypt data using CORA Cyber Security's technology
  2. to lock data using CORAcsi.
  3. to secure The Cloud with CORA's Unbreakable data security.
  4. to protect autonomous resources (the Internet of Things) using CORA as the step beyond encryption.
  5. to provide unbreakable data security without relying on, or trusting, any one company, network, computer or server.

Full Definition of CORA

  1. CORA is an acronym that stands for Context Ordered Replacement Algorithm.
  2. CORA Cyber Security Inc. developed CORA to break apart data into multiple fragments (files) that can be distributed to different storage locations. All files are needed to recombine the original data into a "readable state". A single file cannot reproduce any part of the original "readable data".
  3. CORA Cyber Security Inc. developed MUPs to be re-usable and practical implementations of the famous One Time Pads, which were identified by Claude Shannon as "perfect secrecy".
  4. CORA is a step beyond encryption that is similar to Block chains except that is relies on a centralized control methodology that allows a compromised solution to be shut down while another is being generated (self-healing).


lock, encrypt, secure, protect, guard, defend, shelter, shield, fortify


Nestah was asked to CORAfy the schools photo album.

The police chief directed all officers to CORAfy their laptops.

Juniper saved the day by CORAfying her company's website the day before it was hacked.

The IT department CORAfied the hospital's records.


"Hillary, make sure you 'corafy' the door before you leave."

Justin forgot to 'corafy' the window.

"'Corafy' that purse and don't leave it in the buggy."

Mike used sun block to 'corafy' his bald head.