Principles

Highlights  Home  Comparisons

Dynamic Key

A REVOLUTIONARY PATENTED NEW DYNAMIC KEY CRYPTOGRAPHIC SYSTEM

Secret keys necessary for encryption, authentication, signature, etc. are obtained through a cryptographic process.

Principles

With the Dynamic key process, every user has an electronic device, such as smartcard, microcomputer or virtual card, which is used not only as a means of authentication but also as a means of storing a user's customized profile.  Such process can also be integrated within user array of convenient personal devices, such as cellular phone, cable/satellite controls, organizer, etc.

The dynamic keys necessary for encryption, authentication, signatures, etc. are obtained through a cryptographic process that generates keys from both secret information specific to a particular user and from one or several pieces of ordinary public information.

Through the Dynamic Key Cryptography (DKC) process, keys are no longer transmitted between the sender and recipient of the encrypted message and are therefore no longer at risk for discovery by potential enemies.
Keys are generated automatically at the sender's end to cipher the message or file, and at the receiving end to decipher. With this system, users no longer have to rely on a secure channel of communication to protect themselves from eavesdropping or betrayal.

Highlights  |  Home  |  Comparisons   |  Next Page (Principles Continue)

info@fpbaudin.com