Announcing a new data security level solution .. … …..



Ex0-SyS is an emerging Swiss company focused on the development of new technologies, including digital data security.

In our opinion there are plenty of companies inventing new technologies on the basis of already known ones and trying to enhance them, but this is not our core business.

Ex0-SyS provides an approach which is based not on inventing but on creating new technologies by most of the time going back to the beginning of technologies themselves and totally rethinking them by projecting our mind outside of the box; in this way it allows anyone to see what it is invisible as one remains at the level of currently known technologies.

We are specialized in the creation of technological solutions based exclusively on Re-Mastering the initial conditions founding all information systems known to date.

We wrote and asked a question on Experts Exchange concerning
« the production and use of very long security keys as well as the use of very long prime numbers for encryption systems... ». We received some recommendations about getting validations for our new released Cryptographic System.





### Article copy [begin] ###

Producing & using very long cyphering keys (3000 / 9000 up to 27000 bits) as well as Large Prime Numbers, plus ReScheduling the Binary Structure of any source files and folders for future encryption systems


New approach on Data Security Systems .. ... .....


This article presents a data encoding algorithm on which a digital file encryption software has been developed and which is not based on the RSA system or any other known system. The cyphering key levels of this software have an extremely long length (varying from 3’000 to 9’000 bits, up to 27’000 bits.)

We know that as soon as a certain length in the size of the cyphering keys is exceeded (usually more than 2'048 bits), a very sensitive domain of IT becomes concerned, because the process could potentially be considered as usable as computer weapons.

We have also created another algorithm for the verification and generation of Large Prime Numbers, which seems more powerful than any other known tool currently available on the internet.

Here again we know it is an extremely sensitive field: since the tool we are talking about has no known limit (except the one we impose ourselves concerning the physical hardware), it is very difficult for us to perform all the tests so much the amount of prime numbers to be tested is important (no limits).

In fact, the main data security algorithm that we are presenting has nothing to do with the size of any produced and used cyphering keys, whether they are 3’000 bits long (3 sec to be generated), 9’000 bits (30 sec) or even 27’000 bits (5 min).

These global cyphering keys are also not entirely randomly produced, and their generation is based on an algorithm using prime numbers, thus allowing the software to maintain control over their final structure.

The process is being randomized using the notion of time as a dynamic factor: as time varies constantly, it gives some final keys of large sizes with a random part.

The initial aspect of this cyphering algorithm is based on Re-Scheduling the binary structure of any source files and/or folders that are to be protected.

Thus, it allows the protection of data whose binary structure is completely Re-Scheduled, as well as 3 Physical-Key-Files, making it possible to find the data coherence back when decoding the protected data.

The Main-Protected file thus obtained now has a completely Re-Scheduled binary structure which has been imposed by the 3 Physical-Key-Files which are totally destructured except for the part we initially spoke about concerning the very large cyphering keys.

All files thus produced during the security process have absolutely no possible analysable coherence if studied outside their context – which renders this way of protecting data irreversible once done.

Whether be it the Main-Protected data file or any of the other 3 Physical-Key-Files that have been obtained, none of them can give any indication either about the nature of the original protected files and according to the options selected by the user during the encoding process, all information may be completely destroyed if an unauthorized third party tries to perform a scan on secure data (Main-Protected-File or those corresponding 3 Physical-Key-Files).

Here is a small video in 2 parts: the first part explains the different levels of data security; the second part shows what "Re-Scheduling the Binary Structure" of the protected data means, where the location and what the size of the long cyphering keys are (Small Random Bit parts / 3'000 Bits / 9'000 Bits, 27'000 Bits not being yet authorised) :


Other videos on how to use this encryption software with different scenarios and options as well as an additional demonstration video concerning the Prime Numbers verification and generation online tool are available:


### Article copy [end] ###



Thank you for your interest.

Regards,


For More information about this article, please do not hesitate to contact us.

We will be glad to answer your questions about it : more@ex0-sys.ch


www.ex0-sys.ch

Popular posts from this blog

Ex0-SyS – Ptojet Global Alph@TaV Systems – Angel Investment Network – fin 2018

Welcome to Ex0-SyS blog

Projets et Produits courants Ex0-SyS – Script Présentation Vidéo Kick Starter – Peut être utilisé comme sous-titres de la vidéo.