RANDOM NUMBER GENERATORS

Non-Algorithmic Encryption

The concept of an Encryption Algorithm has an additional twist. It is possible to encrypt data using a processing method, that compute in a more general space than Algorithms. I have studied these system in detail 1994-1999 and collected the most important results in the report Non-Algorithmic Encryption (updated and improved report 2013). I see the concept as important, as using non-algorithmic encryption, several principal difficulties can be overcome, which are problematic for the study of algorithmic encryption.

Encryption Included in the TRNG9803 driver software

Processing of random numbers are essentially an encryption task. We now develop a new software for the TRNG9803, and plan lifting out the encryption part. The new TRNG9803 is based upon the bit-slice DES.

A Critical Remark on Public Key Encryption

Key distribution using public key encryption (public key infrastructure) is investigated, and several problems are listed. The conclusion is that no advantage is gained when using public key: if you want Security, you must still carry keys in a secure way.

Public Key Cryptography -- WHY IT DON'T WORK AND WHY YOU DON'T NEED IT

ASIC-RSA, a Flexible Solution for RSA encryption on ASICs

We have access to a technology for RSA encryption implementation on ASIC:s. The background is that the popular Montgomery multiplication don't scale very well as a function of the modulus size. Before, most implementations used a 512 bit modulus. The current recommended key sizes are 1024-4096 bits, where an implementation preferably would be able to process various key sizes on the same hardware.

Using the ASIC-RSA technology for an ASIC implementation, a solution can be built that use less ASIC area compared to a solution that use Montgomery multiplication. Less area means reduced ASIC costs. Additionally, the solution can be adjusted to take a compromise between implementation chip area and execution time into account. A slower implementation can be built smaller than a fast implementation. The solution can be configured to compute one or several RSA key sizes.

The ASIC-RSA is an engineer trick, and not an algorithm, so it cannot be implemented in software. It is only of value when you build an ASIC.

To the best of my knowledge no patent has been filed on the ASIC-RSA, so a customer may optionally (and hopefully) obtain world-wide patent protection. We are willing to sell this technology exclusively to a single customer.

Encryption Solutions

Most encryption solutions are tailored to meet specific needs of the customer. Please contact us directly if you need help with a security system.

US Patent 6,845,159

The patent for the non-algoritmic encryption is no longer maintained. This imply that the contents in the Non-Algorithmic Encryption Report can now be used everywhere. There are no other patens in any other country.

Check the latest patent status here.

ASIC Solutions

Fast Modular Multiplication

Currently, we don't actively develop the ASIC-RSA solution. If an extremely fast solution is needed, for server side security/RSA encryption, an FPGA implementation of the technology might easily prove a factor faster compared to conventional technology.