Symmetric Block Cipher Cryptosystem
XOTIC leverages powerful mathematical theory developed by the U.S. government during World War II. Using 2018 technology, XOTIC breathes new life into cryptolographic techniques originally proven by Claude Shannon, the father of information theory and cryptography.
Enables in-flight streaming encipherment on any type of data, in real-time
Encipherment strength can be dialed-up or dialed-back depending on the use case
Key exchange process legacy public/private key (asymmetric) encryption methods currently in-use, and eliminates the attack surface provided by (symmetric) encryption methods such as AES.
Streaming media, movies, or even live meetings can now have XOTIC’s deeply hardened encryption applied without disturbing the quality.
XOTIC can be incorporated into standard email clients such as Gmail, Yahoo!, Hotmail, as well as Microsoft Office products to create deeply hardened private conversations between recipients. Additionally, by setting your email client to only accept mail secure using XOTIC, it eliminates the possibility of receiving “phishing” emails from spoofed senders.
XOTIC is ideal for securing large files, volumes, IoT data, data in public cloud environments, on mobile devices, within big data sets, or in large enterprise environments.Able to be imbedded into a multitude of devices and form-factors.
Able to be imbedded into a multitude of devices and form-factors.
The XOTIC Cryptosystem is comprised of two primary elements:
Key Generation scheme
The XOTIC key generation scheme employs random number generation to produce several precursor outputs that are used in the encryption primitive to generate a ciphertext output. These precursor outputs include:
• The Deterministic Seed Generator (DSG) Vector; an array of random 32-bit integers resulting from mathematical operations on the output of a random number generation process.
• A Substitution Table or S-Box; a 256-element array of random 32-bit integers that has been mathematically randomized by combining it with the DSG. The state of the S-Box is dependent on the current state of the DSG Vector, which is modified with every encryption operation.
• An Addition Table or A-Box; a 255-element array of random 32-bit integers that has been mathematically randomized by combining it with the DSG. The state of the A-Box is dependent on the current state of the DSG Vector, which is modified with every encryption operation
• A Working Key; an encryption key of variable length (length variations are user or system determinable, depending on the implementation)
• A Ciphertext Header; a messaging component prepended to the ciphertext output