Complex multi-point networks
+ Direct, bi-directional data transmissions between all points
+ Any combination of recipients
+ Fully-encrypted communication in supply chains
Protect your systems from today's attacks - and tomorrow's.
We don't just add more locks to the door - we change the door completely.
Enrcytp, Inc. has developed a quantum-resistant algorithm an order of magnitude stronger and faster and customisable than existing solutions, and with true user-defined configurability designed to protect against all forms of cyber-attacks but with a special focus on mitigating attacks via quantum machines.
Enrcytp integrates seamlessly with pre-existing networks and systems of all types, eliminating the need for expensive and time consuming hardware purchases and refreshes.
Enrcytp's strength and versatility is beyond what anyone else can offer.
inventor & Chief Scientist
Massachusetts Institute of Technology, M.Sc., Applied Mathematics, H. B.Sc. Nuclear Science and Engineering
Our inventor and chief scientist is a physicist/mathematician turned microprocessor designer and hardware architect. His career began at the age of 12 as the third employee of Intel Canada. At the age of 14 he entered the Massachusetts Institute of Technology (MIT) where he studied subatomic particles using sparse matrix analyses that would later see expression in signal processing, video compression techniques, and internet protocol TV.
He graduated at 16 from MIT and at 17 rejoined Intel Corporation as a hardware design engineer, advanced to be the head of the 47 employee Special Systems Organization out of which came the building blocks of the X86 family of 32 bit processor computers. He later became the head of Intel’s Advanced Research Group, the highest research position at Intel, and led their R&D effort not only into new processors but also into such areas as compiler design, materials research, and chip manufacturing processes. During this time, he was a consultant and developer for government agencies including NASA, educational institutions, and private business thus gaining experience with numerous and diverse computer systems.
In 1990 he co-founded a communications company where he headed their research into video and audio compression and image transmission techniques.
From 2003 to 2006 he was the Chief Scientist at Vectrics, now Magna International’s Autonomous Vehicle Division. He is an accomplished, proven scientist in the field of video/image processing and algorithm development, has an in-depth understanding of CPUs, and is an excellent scientific/technical problem solver.
More recently he designed and implemented an IP service including: High Speed Internet, 130+ channel HDTV, and high quality telephone. He has also researched and consulted in the areas of Micro radar sensing of movement for a variety of applications. He is an inventor of a signal processing-patented technology that became the base of Internet protocol TV, and is co-inventor, together with other Enrcytp Inc. team members, of a patented image-based, vehicle occupant classification system.
He brings to Enrcytp an unparalleled theoretical understanding of computers and communications networks with an uncanny practical ability to get diverse devices to work as a single system under software control.
Businesses in the post-COVID world are at the mercy of legacy network security — all of which is easily breakable with commercial super-computers. At home or at office, Enrcytp's encoding method fundamentally safeguards all IoT and BYOD communication.
Attack vectors increase exponentially on 5G and 6G networks. Same also with cloud-native architecture. Enrcytp's security algorithm fits with commonly available hardware to secure data transmissions across all surface areas.
Experts worldwide can exploit the linearity of existing Data Encryption Standards. No matter how it evolves, “linear” encryption will continue to be vulnerable. Enrcytp's unique transmission method can be configured per individual security requirements, in any network, and provide unbroken end-to-end data transmission.
Besides overcoming vulnerabilities to data security, Enrcytp makes information completely unreadable if stolen. Any industry can use our secure methods of data transmissions in a variety of ways.
Enrcytp's unique algorithm powers a suite of technologies that includes:
- User Access Control device
- End-to-End Communication encryption
- Databases and Storage Device encryption
and
- Singular File Encryption software utility
+ Direct, bi-directional data transmissions between all points
+ Any combination of recipients
+ Fully-encrypted communication in supply chains
+ Medical test results, EHR's
+ Payment transactions
+ Financial statements
+ Commercial
+ Private
+ Governmental
Dynamic encryption algorithm completed, future version enhancements identified.
Testing of encrypted data confirms security functionality.
Development of software for use and compliance with network, database, and communication protocols.
FIPS IT security compliance and NIST standards testing.
Do you have more questions?
Reach out and let us know!
Incidents relating to improper access to the transmission and storage of information are increasing rapidly. This is primarily because the opportunities and tools required to improperly access and decipher networks and storage are readily available and relatively cheap.
It also does not help that knowledge on prevention is severely lagging.
All existing, commercial encryption methods will be broken by those with computing power capability that is widely available — and cheap.
Other than one novel component of our method, which makes the combined method so much better, we use long proven and accepted methods. Our secret sauce is how we combine them.
We believe that our combined methods are an order of magnitude harder to break and would require a hacker to have an unprecedented level of internal access to a communications network.
One of the largest computer services companies in the world recently told us (non-confidentially) that there is no data transmission or storage encryption method that they could not decrypt and access now.
Cheap, widely-available computing power greatly reduces the effectiveness of existing encryption methods. Supercomputer accelerators and graphics cards are now available for servers and even notebook computers. Forms of supercomputers used in Bitcoin miners and gaming machines are an even greater immediate threat.
It was actually simple. We determined that doing more of the same was not an answer — nor were proposed changes to encryption methods such as merely expanding key lengths. Something better was required, and so we used our experience in data communications networks to combine several easy-to-implement methods that make it an order of magnitude more difficult to improperly access data transmission.
We have a unique method of combining encryption, key generation, and transmission. Our method can be implemented in existing communication networks with no structural changes. It is different, “structurally”, from existing encryption methods since it combines features and can be implemented to whatever degree of security a customer desires.
The increase of work taking place in home residences with inadequate security provides more access points and vulnerability to data flow and storage. 5G implementation also provides incremental access points (as do expanding interrelationships of companies and their supply chains). Vulnerability is quite simply determined by the weakest link.
We have developed, tested, and proven our encryption method. We now need our software experts to develop the software to interface it with existing communication network protocols. We are interested in collaborating with those with an interest in the need for our methods and the financial and marketing resources to help bring it to market.
Yes, it can be used to encrypt a database although it is designed primarily for multi-point data communications networks. We would recommend it only for a database that needs absolute security and where slower access speed and cost is not a concern.
It is both. The software can be embedded in a secure chip and can be implemented as secure paired boxes with the embedded processor running our software. It can also be implemented as purely software depending on the existing or planned network characteristics.
Yes, it can be used by individuals likely running software at both ends compared to corporations with multi-point communication access points preferring a hardware implementation.
Initial implementation might be between A and B, then A and C, then B and C to a full, securely-encrypted multi-point communications network. Planning, as always, is the key.
We are ready to answer your questions!