PKMS2® – Pattern Key, Multi-Segment, Multi-Standard

The PKMS2® SDK is a proprietary software implementation of the PKMS2® symmetric block cipher mode of operation. The PKMS2® SDK is software designed to use cryptography, and employs digital techniques to ensure information security, including confidentiality, integrity and authenticity. The PKMS2® mode is applicable to any data type and any set of symmetric block cipher primitives, such as the Advanced Encryption Standard (AES), promulgated by the US National Institute of Standards and Technology (NIST) or the Aria cipher, published by the Korean Agency for Technology and Standards (KATS).

In The News

Android Flaw - Stagefright
CEO Richard Blech Quote By Tech News World
Super-Scary Android Flaw Found Zimperium on Monday revealed a stunning discovery by researcher...
Cybercriminals Exploit Gmail Feature to Scale Up Attacks
Criminals are taking advantage of Gmail's 'dots don't matter' feature to set up multiple...
CEO Richard Blech Provides Expertise On NJ Hospital Hack
Encryption Expert on NJ Hospital Patient Data Breach Richard Blech, CEO and Co-Founder of...

PKMS2® and your Business

  • Patented method for combining encryption algorithms
  • Encryption strength increases to (387-bit to 512-bit)
  • Choice of 2 to 8 trusted algorithms, including (AES)
  • Swappable API replacement for (AES) library
  • Fully compliant for any industry
  • Platform agnostic integration
  • Additional protection benefits:

    -Increased side-channel attack resistance

    -Fall-back security should one algorithm get broken

    -Provides cryptographic agility in being able to incorporate new quantum-resistant algorithms as they becomes available

     

Technology in the News

ZIPcrypt Review: A Revolutionary Encryption Tool

By SoftwareSugges We’re living in a hyper-digital era and never before has cryptography attained such massive importance in our lives. Organizations all over the globe have realized the value of encryption tools to ensure that their data is protected in transit and...

How to Avoid the Top Three Causes of Data Breaches in 2019

What's the price of unprotected IT infrastructure? Cybercrime Magazine says that global damages will surpass $6 billion as soon as 2021. Here we'll go through some of the most frequent and emerging causes of data breaches in 2019 and see how to address them in a...

Google confirms ‘quantum supremacy’ breakthrough

Google has officially announced that it’s achieved quantum supremacy in a new article published in the scientific journal Nature. The announcement comes exactly one month after it initially leaked, when Google’s paper was accidentally published early.Did you enjoy...

NordVPN confirms it was hacked

NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached.Did you enjoy this article? Then read the full version from the author's...

We asked a hacker to try and steal a CNN tech reporter’s data. Here’s what happened

I share, therefore I am. I am the kind of person who posts Instagram photos (filtered, of course) from my vacation. I am also the kind of person who tweets about buying an overly-expensive piece of furniture because I fell for a sleek online ad about how it would...

Newsrooms, let’s talk about G Suite

There are many legitimate reasons to give administrators this far-reaching ability to organize and retain user data, such as compliance with legal requests. All of this logging and retention functionality may also help your organization’s administrators monitor for...

In the last 10 months, 140 local governments, police stations and hospitals have been held hostage by ransomware attacks

The attack starts, innocently enough, with an email. But when someone clicks the link inside, hackers quickly take over. CNN's Tina Burnside, Kevin Collier, Pierre Meihan, Faith Karimi, Eli Watkins and Zachary Cohen contributed to this story. Did you enjoy this...

Cloud Breaches Like Capital One Will Strike At Self-Driving Cars

The news has covered yet another breach of systems security that involves the theft of massive amounts of data, in this case impacting an estimated 100 million customers of Capital One Financial Corp. In the past, the public might have reacted vociferously in outright...

Siemens-Poneman Study: Cyber attacks on power utilities are growing in numbers, complexity

The cybersecurity risks against critical power infrastructure seems to be worsening, as a new study indicates that 56 percent of respondents reported their companies suffered one or more shutdowns or loss of operational data per year. Did you enjoy this article? Then...

Hack Breaks PDF Encryption, Opens Content to Attackers

Researchers in Germany have invented a new hack that can allow someone to break the encryption of PDF files and access their content  — or even forge signed PDF files under certain circumstances. Did you enjoy this article? Then read the full version from the author's...

SCI Solutions Using PKMS2® Technology

Peer Reviews for (Licensed) PKMS2

Dr. Matthew Green

Assistant Professor of Computer Science The Johns Hopkins University “provides surprisingly strong security”

Dr. Stefano Tessaro

Assistant Professor of Computer Science University of California, Santa Barbara “(I am) not aware of any other schemes (theoretical or practical) that achieve similar guarantees with the same degree of efficiency.”

Dr. Yevgeniy Dodis

Professor of Computer Science University of California, Santa Barbara “PKMS2® provides an excellent way of protecting information against very powerful attacks.”

What is PKMS2®?

  • Combines and hardens from 2 to 8 existing, known, symmetric algorithms using an easily deployable mode of operation
  • Starting strength is 387-bit, mitigates against brute force & side channel attacks
  • Can incorporate new (Quantum-resilient) ciphers currently being evaluated as they become available