This latest process protects corporations and government agencies that are utilizing the AES-256 encryption standard by vastly strengthening it through segmenting and layering while still allowing them to remain firmly within FIPS compliance. The process is configurable for compliance with FIPS 140-2, can be integrated into any application requiring block cipher encryption algorithms and can be integrated with enterprise key management solutions. The mathematics behind the PKMS2 protocol proves its efficacy in thwarting an attack where the first layer of AES-256 fails, and the protocol acts as a secondary layer.
The new protocol is offered within the firm's virtual encrypted storage product, ParaDoxBox, and the Superencipherment Engine tool which offers a massive fifty percent increase in bit strength. For example AES-256 security is improved to 386 bits of security after implementation of the PKMS2 process. It increases a potential attacker's workload by a factor of at least two orders of magnitude, making any intrusion completely unfeasible. The protocol is extremely fast but is not "heavy" and will not adversely affect the speed and flow that data travels through network infrastructure.
"Compute power continues to increase, and there are hacking groups and state-funded agencies that are actively trying to thwart AES-256," says Richard Blech, Chief Executive Officer of Secure Channels Inc. "The market needs new primitives and protocols that improve capabilities and solve a host of security problems. Our solution is the only one that offers the versatility to manage full disk, partition, file, and cloud sharing encryption, combined with enterprise features such as key and license management and remote install."