We provide mobile security to end-users, businesses and / or enterprises via extensible cryptography. Our system uses numbers to perform the rigorous operation of encryption and decryption. It is quite suited for modern and future computing since its capacity is 8 times the state of the art (AES). It certainly saves time, storage and prop a lacking CPU. Some of the products are software as well as hardware. The software will be dominant in computers and particularly mobile devices because of their constrained nature. We are seeing the use of mobile devices in many organizations: They are traversing critical data points or servers. Mobile devices have limited RAM, Storage and CPU speed: Therefore an efficient system of encryption with less footprint is what we provide. The hardware aspect will be incorporated in firewalls or serve as firewalls. We will also provide custom tokens for VPN-SSL communication. These products will allow us to play vital roles in maintaining security regulations, policies, compliance and audit and IT governance. We are not concentrating on a domain of Cryptography alone. We also have products for IT information Risk management, Software development. security, access control. We also have plans for tools that could be used by SIRT and later for securing IoT. We have presented our most interesting product called LokDon. This is a cryptographic system that uses symmetric key cryptography. It is capable of securing any data by using 2048 bits of encryption.
There has never been a time when humans needed privacy than now. We have a better way of performing encryption with a new base technology called skcjju256. This technology evolved over 15 years of development. After extensive research and development we are confident to share this with you. This technology is based on the movement of a knight on a chess board. We strictly mean the legal movement of a knight on a chess board of m * n dimension. Why did we decide to approach the problem from this angle? We noted that whenever two people are playing the game of chess one will ultimately emerge as the victor either by rendering the king immovable or by capturing more pieces, which means more points. So from these vantage point we can tell that we are on the right track at least. It wasn’t until 2010 which was exactly 10 years starting from 2000 when the idea was first conceived that I realized the strength in the movement of the knight. It is a well known fact that a knight can move continuously from a square (white or black) while touching all other squares on the chess board at least once absent back tracking and without landing on the original starting point. This functional practice is what they call open knight’ tour. I figured that if there is way to use this to hide components of written language then it is possible to hide information with the it. So this moment when successfully completed without any hiccups presents sets of numbers which forms families (same starting positions); yet different from each other by a very significant margin. The combination found in these families are quite infinite thus, they can serve as perfect master keys in the age we live in.
Finally, I solved the problem completely in 2013 by harnessing these numbers. I sought patent to the work in 2012. I also published my work on www.skcjju256.com while withholding other necessary and intellectual details from all prying eyes. In 2014 we launched two prototypes; skcjju256 for windows and LokDon ver 1.0 for Android. The whole idea is for you to get a feel of what we are doing and to see for yourself how it works. In the research, I noticed that the process in the AES algorithm is analogous to Rubik’ Cube. I also noticed that the scope constraint in AES makes it possible the use of S-Box. All these simply means that the mechanism is slower, data consuming and it is not easily implemented in hardware. We found out that the base technology extends AES both in complexity and compression. It has 8 times AES’ capacity and this simply means that we won’t have to worry about nothing when quantum computing arrives. Today, authorities in cryptography agree on all fronts that encryption is the best way to protect data integrity. The only question left now should be this one. Is it possible that we have found a way to extend AES which is the state of the art in block cipher cryptography? To answer that question let us show you the advantages of our base technology and you can conclude for yourself.
Note extending the maximum scope of AES will remove S-Box: Removing this matrix inverse multiplication function equally invalidates the stages of AES mechanism shown in #1 advantage.