CYPHYX is developing technology that disrupts the cybersecurity market and introduces new ideas that alter the paradigm for data protection while still using industry standard components. The first of these new "big ideas" is DARE (Dynamic and Random Encryption), which is our patented method for protecting data.
CYPHYX has even more market changing technologies in development and will be bringing them to market in the near future. All of these technologies are intended to solve problems or fill needs. They approach the problems or needs using a new and different perspective where the technology is designed to be simple to use while bringing the highest level of protection possible. And all of this using a component approach, which allows the technologies to be standalone or integrated together to form overall comprehensive solutions.
All of these technologies bring a number of advantages to the market that give CYPHYX products features and functions that other products just cannot match. Following are descriptions of just some of those many advantages.
RANDOMLY SELECTED, MULTIPLE STRONG ENCRYPTION ALGORITHMS
Using CYPHYX technology, DARE, means that our products are not limited to a single encryption algorithm such as AES or DES, but instead we use those and MULTIPLE other strong encryption algorithms to secure the content. Our products randomly select an algorithm each time they are used for protection, which makes cracking that protection nearly impossible on its own.
SINGLE USE KEYS THAT EXIST FOR MERE NANOSECONDS
While other products repeatedly use the same key, which provides information to the hacker that allows them over time to accumulate the necessary information to defeat the protection. CYPHYX products eliminate this weakness by randomly selecting single use keys. Each key that is created in this manner exist only one time and is only held internally to the CYPHYX product where it exists for mere microseconds.
CYPHYX PRODUCTS ARE COMPONENT BASED
While other products on the market are large suites containing many functions the customer may not want or need, CYPHYX products are strictly component based, allowing the customer to custom build a suite of solutions that meet their specific needs and wants while keeping the product cost-effective.
SIMPLE TO USE AND EASY TO IMPLEMENT
With CYPHYX products, the ease of implementation is only the beginning. Once installed and configured, the operation of CYPHYX products tend to become second nature and thus fades into the background. Then, only when the needs of the customer changes, is there really a need to interact with the products. Of course while this can be the case it doesn't mean the customer is unable to easily monitor the product’s operation or easily alter its configuration if they so desire. CYPHYX products are intended to make their use something that is desired rather than – as with many existing products – something that is endured.
The approach used to secure the data is able to be tailored specifically to how the data is accessed and used by the specific business implementing it. There are any number of ways to implement how the data is protected as part of the methods used to access it by the business. This means CYPHYX products adapt to the business instead of the business having to adapt their processes to the product.
Because of how we develop technologies, like our patented technology DARE, those technologies are quantum computer resistant as well as future-proofed. As computers become ever more powerful and new encryption algorithms are created, DARE will grow, adapt, and become ever more secure. Our technologies are able to scale to any platform from an embedded Internet of Things device to the largest enterprise computer systems. Technologies like DARE can also adapt due to their ability to incorporate new and ever more complex encryption algorithms as they are created. It is attributes like this that lead to an ever more secure technology that is also future-proofed.
For really secure communications, you then need to share a new key each time you want to communicate information that is supposed to be secret. The use of a new key each time is considered to be equivalent to using what cryptographers call a one-time pad. A one-time pad harkens back to the days when an actual encryption key was distributed on paper and a unique sheet of paper was used each time. Because each key is used only once, cracking such encryption is difficult.Wayne Rash, eWeek article, "Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security"
12870 Trade Way Four
Suite 107 #665
Bonita Springs, Fl. 34135