Innovative Encryption Technology for Next Generation Security Needs

Simple, Flexible, Safe.

Protect your systems from today's attacks - and tomorrow's.

We don't just add more locks to the door - we change the door completely.

Contact us
Enrcytp, Inc.

Enrcytp, Inc. has developed a quantum-resistant algorithm an order of magnitude stronger and faster and customisable than existing solutions, and with true user-defined configurability designed to protect against all forms of cyber-attacks but with a special focus on mitigating attacks via quantum machines.

Enrcytp integrates seamlessly with pre-existing networks and systems of all types, eliminating the need for expensive and time consuming hardware purchases and refreshes.

Enrcytp's strength and versatility is beyond what anyone else can offer.

Credentials

inventor & Chief Scientist

Massachusetts Institute of Technology, M.Sc., Applied Mathematics, H. B.Sc. Nuclear Science and Engineering

Our inventor and chief scientist is a physicist/mathematician turned microprocessor designer and hardware architect. His career began at the age of 12 as the third employee of Intel Canada. At the age of 14 he entered the Massachusetts Institute of Technology (MIT) where he studied subatomic particles using sparse matrix analyses that would later see expression in signal processing, video compression techniques, and internet protocol TV.

He graduated at 16  from MIT and at 17 rejoined Intel Corporation as a hardware design engineer, advanced to be the head of the 47 employee Special Systems Organization out of which came the building blocks of the X86 family of 32 bit processor computers. He later became the head of Intel’s Advanced Research Group, the highest research position at Intel, and led their R&D effort not only into new processors but also into such areas as compiler design, materials research, and chip manufacturing processes. During this time, he was a consultant and developer for government agencies including NASA, educational institutions, and private business thus gaining experience with numerous and diverse computer systems.

In 1990 he co-founded a communications company where he headed their research into video and audio compression and image transmission techniques.

From 2003 to 2006 he was the Chief Scientist at Vectrics, now Magna International’s Autonomous Vehicle Division. He is an accomplished, proven scientist in the field of video/image processing and algorithm development, has an in-depth understanding of CPUs, and is an excellent scientific/technical problem solver.

More recently he designed and implemented an IP service including: High Speed Internet, 130+ channel HDTV, and high quality telephone. He has also researched and consulted in the areas of Micro radar sensing of movement for a variety of applications. He is an inventor of a signal processing-patented technology that became the base of Internet protocol TV, and is co-inventor, together with other Enrcytp Inc. team members, of a patented image-based, vehicle occupant classification system.

He brings to Enrcytp an unparalleled theoretical understanding of computers and communications networks with an uncanny practical ability to get diverse devices to work as a single system under software control.

Enrcytp makes the following truly secure:

Remote working

Businesses in the post-COVID world are at the mercy of legacy network security — all of which is easily breakable with commercial super-computers. At home or at office, Enrcytp's encoding method fundamentally safeguards all IoT and BYOD communication.

Next-generation infrastructures

Attack vectors increase exponentially on 5G and 6G networks. Same also with cloud-native architecture. Enrcytp's security algorithm fits with commonly available hardware to secure data transmissions across all surface areas.

Private and Public Transactions

Experts worldwide can exploit the linearity of existing  Data Encryption Standards. No matter how it evolves, “linear” encryption will continue to be vulnerable. Enrcytp's unique transmission method can be configured per individual security requirements, in any network, and provide unbroken end-to-end data transmission.

Practical uses of Enrcytp's technology

Besides overcoming vulnerabilities to data security, Enrcytp makes information completely unreadable if stolen. Any industry can use our secure methods of data transmissions in a variety of ways.

Enrcytp's unique algorithm powers a suite of technologies that includes:

- User Access Control device
- End-to-End Communication encryption
- Databases and Storage Device encryption
and
- Singular File Encryption software utility

Complex multi-point networks

+ Direct, bi-directional data transmissions between all points
+ Any combination of recipients
+ Fully-encrypted communication in supply chains

One-time, one-way transmissions

+ Medical test results, EHR's
+ Payment transactions
+ Financial statements

Secure Data on Servers

+ Commercial
+ Private
+ Governmental

Status

Development Status

Step 1

Dynamic encryption algorithm completed, future version enhancements identified.

Step 2

Testing of encrypted data confirms security functionality.

STEP 3

Development of software for use and compliance with network, database, and  communication protocols.

STEP 4

FIPS IT security compliance and NIST standards testing.

Doubts? Before reaching out, here are FAQs about our method.

Do you have more questions?
Reach out
and let us know!

Why is a new method of encryption needed?

Incidents relating to improper access to the transmission and storage of information are increasing rapidly. This is primarily because the opportunities and tools required to improperly access and decipher networks and storage are readily available and relatively cheap.

It also does not help that knowledge on prevention is severely lagging.

All existing, commercial encryption methods will be broken by those with computing power capability that is widely available — and cheap.

The  saying, “If it sounds too good to be true, it usually is” comes to mind. Why should I feel different about what Enrcytp says? Can you assure me that Enrcytp’s encryption technology is  so much better than existing encryption methods?

Other than one novel component of our method, which makes the combined method so much better, we use long proven and accepted methods. Our secret sauce is how we combine them.

We believe that our combined methods are an order of magnitude harder to break and would require a hacker to have an unprecedented level of internal access to a communications network.

Is it likely that current technologies to protect my data will be compromised in the future due to AI and other technologies?

One of the largest computer services companies in the world recently told us (non-confidentially) that there is no data transmission or storage encryption method that they could not decrypt and access now.

Cheap, widely-available computing power greatly reduces the effectiveness of existing encryption methods. Supercomputer accelerators and graphics cards are now available for servers and even notebook computers. Forms of supercomputers used in Bitcoin miners and gaming machines are an even greater immediate threat.

How did Enrcytp and its founders arrive at the current technology ideas?

It was actually simple. We determined that doing more of the same was not an answer — nor were proposed changes to encryption methods such as merely expanding key lengths. Something better was required, and so we used our experience in data communications networks to combine several easy-to-implement methods that make it an order of magnitude more difficult to improperly access data transmission.

Why do you feel that Enrcytp can overcome the weaknesses in current encryption methods? Is there something structural to what you are proposing?

We have a unique method of combining encryption, key generation, and transmission. Our method can be implemented in existing communication networks with no structural changes. It is different, “structurally”, from existing encryption methods since it combines features and can be implemented to whatever degree of security a customer desires.

Does the current work-from-home environment due to COVID-19 increase vulnerabilities to my company’s data?

The increase of work taking place in home residences with inadequate security provides more access points and vulnerability to data flow and storage. 5G implementation also provides incremental access points (as do expanding interrelationships of companies and their supply chains). Vulnerability is quite simply determined by the weakest link.

Is Enrcytp a commercially ready solution now? What is needed for Enrcytp to become a fully commercialized encryption solution?

We have developed, tested, and proven our encryption method. We now need our software experts to develop the software to interface it with existing communication network protocols. We are interested in collaborating with those with an interest in the need for our methods and the financial and marketing resources to help bring it to market.

Can I use Enrcytp to encrypt my databases?

Yes, it can be used to encrypt a database although it is designed primarily for multi-point data communications networks. We would recommend it only for a database that needs absolute security and where slower access speed and cost is not a concern.

Is Enrcytp a software, a hardware solution, or both?

It is both. The software can be embedded in a secure chip and can be implemented as secure paired boxes with the embedded processor running our software. It can also be implemented as purely software depending on the existing or planned network characteristics.

Is the technology scalable? Can it be used for individual, non-commercial applications such as the home user as well as corporations?

Yes, it can be used by individuals likely running software at both ends compared to corporations with multi-point communication access points preferring a hardware implementation.

How would I install Enrcytp’s solution in my company? Are there phase-in options?

Initial implementation might be between A and B, then A and C, then B and C to a full, securely-encrypted multi-point communications network. Planning, as always, is the key.

Interested in knowing more?
Give us a shout.

We are ready to answer your questions!

Robert Forsyth, ceo, enrcytp, inc.
+1 647 794 3323rnforsyth@Enrcytp-Inc.com
© 2020 Enrcytp. All Rights Reserved.