Announced the world's first mutual authentication device "ATOM"
Press release
December 10, 2025
Using the World's First Mutual Authentication Device “ATOM”
Announcing the Ultimate Secure Communication Method Using a One-of-a-Kind Key
AI Power Co., Ltd.
AI Power Co., Ltd. (Headquarters: Shinjuku-ku, Tokyo; President: Shinji Matsuda) has updated the protocol design for establishing secure communication centered on its “ATOM” device and technology. This device solves the hassle of password management and the threat of information leaks by utilizing encryption keys that are unpredictable to humans, based on natural physical phenomena (nuclear decay). Cybercrime is becoming increasingly sophisticated, with growing incidents where not only corporate systems but also personal computers and smartphones are hijacked without the user's knowledge. ATOM utilizes the world's first* truly random numbers generated from alpha particles emitted during the natural decay of atomic nuclei. These numbers are computationally unpredictable. This enables: ① Password elimination, ② Hacking prevention, and ③ Fundamental neutralization of phishing scams and impersonation. ATOM expands an environment where anyone can safely use online services.
World's first* (based on our research as of December 2025)
For network communications—such as online shopping, credit card and bank account payments, international money transfers, cryptocurrency transactions, and business-to-business commerce—authentication is essential. This process verifies that the user (client) and service provider (server) are indeed who they claim to be. Conventional authentication involves sending ID and password information from one party, which is then verified against stored information on the receiving end. However, if a user is somehow directed to a fake website designed to look exactly like the real one where they enter their ID and password, they will input their genuine credentials.
Furthermore, there is a risk that the ID and password could be intercepted during transmission, allowing unauthorized parties to obtain the authentication credentials. While the content of the communication is protected by encryption, concerns have been raised that the encryption methods (keys) themselves could be cracked more quickly in the future due to advances in computational technology and the emergence of quantum computers, whose capabilities far exceed those of current computers. Although encryption keys use seemingly random “random numbers,” commonly used random numbers are “pseudo-random” generated by computers. This means the possibility of discovering some pattern and decrypting the code cannot be completely ruled out.
To obtain completely random “true random numbers*1,” ATOM utilizes the phenomenon of natural nuclear decay. Based on “nature's dice (atomic motion),” these are genuine random numbers unpredictable by anyone, making them “a one-of-a-kind key in the world.” Furthermore, the system ensures only the ciphertext flows over the communication path; the key itself is never transmitted. Even if communications are intercepted, the use of disposable, one-time-use keys means attackers cannot exploit them.
◇
ATOM authenticates the legitimacy of communication partners by having both the server and client generate, hold, and mutually verify true random numbers. This prevents phishing using fake servers and keylogging. Furthermore, by using the random numbers generated by both parties for authentication, it eliminates the need for users to input authentication information. Between the server and client, only the exclusive OR (XOR) of these random numbers is transmitted, ensuring the same information is never sent twice. This makes it extremely difficult for an eavesdropper to obtain authentication information by intercepting the communication.
Shinji Matsuda, President of AI Power, stated: "The significance of this design update lies in ATOM's concept of using natural fluctuations as the direct source of keys, rather than ‘generating random numbers through pseudo-computations.’ This protocol update eliminates the need for password input or biometric authentication. Consequently, it neutralizes attempts to exploit quantum computing power to decrypt password keys through computational means. We will continue working to implement countermeasures against cyberattacks, including hacking, for society."
<Contact Information>
AI Power Co., Ltd.
Phone: 03-6899-3966
Email: info@ai-power3.com
【Glossary】
*1 True Random Number Generator (TRNG): Historically, obtaining truly random numbers (true random numbers) was difficult. Combined with technical convenience, using pseudo-random numbers was common practice. However, it is theoretically understood that pseudo-random numbers generated by current representative methods, such as the Mersenne Twister, can be predicted within a realistic timeframe under quantum computers. This necessitates new random number generation methods. Among these, one promising method involves observing physical phenomena to obtain true random numbers (physical random numbers). Representative methods for obtaining physical random numbers include utilizing radioactive element decay or thermal noise within electronic circuits.
*2 Exclusive OR (XOR): In binary computation, an operation that returns 1 (True) when one bit value differs from the other, and 0 (False) when they are identical. Crucial for authentication in ATOM is the property of XOR: taking the XOR of one value (A) with the XOR of the other value (B), then taking the XOR of B again, yields the original A.
*3 NIST SP 800-22: Refers to the testing tool developed by the National Institute of Standards and Technology (NIST) to verify the randomness of (pseudo) random number generators.
【Security Points】
■Cyberattacks that steal input information (phishing, keylogging) are fundamentally impossible
・Since both parties use genuine random numbers they generate for mutual authentication, users do not need to input credentials. Therefore, cyberattacks that steal input information, such as phishing or keylogging, are fundamentally impossible.
・The random numbers used are physical random numbers generated by detecting the pulse intervals of atomic natural decay on a semiconductor. Therefore, true random numbers are used, not pseudo-random numbers.
■Replay attacks are fundamentally impossible even if communications are intercepted on the communication channel
・The communication channel between the server and client constantly transmits the exclusive OR (XOR) of two true random numbers. The individual true random numbers themselves, which serve as the authentication means for each party, are never transmitted. The randomness of this XOR is verified using NIST SP 800-22*3. Therefore, even if information flowing through the communication channel is illegally obtained, it is difficult to reconstruct the authentication information (the original random numbers).
・Furthermore, each XOR is transmitted only once over the communication channel. This fundamentally prevents replay attacks (methods of unauthorized login using intercepted authentication information).
<Company Overview>
Company Name: AI Power Co., Ltd.
President and CEO: Shinji Matsuda
Established: August 2024
Business Description: Provision of original AI agents utilizing proprietary deep learning, including AI energy balancing systems. Through AI parallel analysis system development and AI consulting, we aim to be a next-generation energy technology development company focused on innovation and sustainability. Furthermore, in the development of “Hydrogen Magnesium Energy,” we employ AI-powered chemical analysis and manufacturing technology, pursuing research that enhances energy efficiency and reduces costs.
Location: 12F, YKB Ensign Building, 4-28-4 Yotsuya, Shinjuku-ku, Tokyo
Website: https://ai-power3.com/
source:https://www.nikkei.com/compass/content/PRTKDB000000002_000169612/preview source:https://prtimes.jp/main/html/rd/p/000000002.000169612.html
Last updated