New approach on Data Security Systems .. … …..
New data encoding algorithm on which a digital file encryption software has been developed and which is not based on the RSA system or any other known system. The cyphering key levels of this software have an extremely long length (varying from 3’000 to 9’000 bits, up to 27’000 bits.)
We know that as soon as a certain length in the size of the cyphering keys is exceeded (usually more than 2’048 bits), a very sensitive domain of IT becomes concerned, because the process could potentially be considered as usable as computer weapons.
We have also created another algorithm for the verification and generation of Large Prime Numbers, which seems more powerful than any other known tool currently available on the internet.
Here again we know it is an extremely sensitive field: since the tool we are talking about has no known limit (except the one we impose ourselves concerning the physical hardware), it is very difficult for us to perform all the tests so much the amount of prime numbers to be tested is important (no limits).
In fact, the main data security algorithm that we are presenting has nothing to do with the size of any produced and used cyphering keys, whether they are 3’000 bits long (3 sec to be generated), 9’000 bits (30 sec) or even 27’000 bits (5 min).
These global cyphering keys are also not entirely randomly produced, and their generation is based on an algorithm using prime numbers, thus allowing the software to maintain control over their final structure.
The process is being randomized using the notion of time as a dynamic factor: as time varies constantly, it gives some final keys of large sizes with a random part.
The initial aspect of this cyphering algorithm is based on Re-Scheduling the binary structure of any source files and/or folders that are to be protected.
Thus, it allows the protection of data whose binary structure is completely Re-Scheduled, as well as 3 Physical-Key-Files, making it possible to find the data coherence back when decoding the protected data.
The Main-Protected file thus obtained now has a completely Re-Scheduled binary structure which has been imposed by the 3 Physical-Key-Files which are totally destructured except for the part we initially spoke about concerning the very large cyphering keys.
All files thus produced during the security process have absolutely no possible analysable coherence if studied outside their context – which renders this way of protecting data irreversible once done.
Whether be it the Main-Protected data file or any of the other 3 Physical-Key-Files that have been obtained, none of them can give any indication either about the nature of the original protected files and according to the options selected by the user during the encoding process, all information may be completely destroyed if an unauthorized third party tries to perform a scan on secure data (Main-Protected-File or those corresponding 3 Physical-Key-Files).
Here is a small video in 2 parts: the first part explains the different levels of data security; the second part shows what “Re-Scheduling the Binary Structure” of the protected data means, and where the location and what the size of the long cyphering keys are (Small Random Bit parts / 3’000 Bits / 9’000 Bits, 27’000 Bits not being yet authorised) :
Other videos on how to use this encryption software with different scenarios and options as well as an additional demonstration video concerning the Prime Numbers verification and generation online tool are available:
Thank you for your interest.
Ex0-SyS Roland LECOCQ www.ex0-sys.ch