Principles (continue)


The generation of keys using the DKC process significantly increases the level of security:

  • a key is no longer selected by the user but through a cryptographic function.

  • the encryption key is no longer sent to the intended recipient of the encrypted data, thereby eliminating the possibility of the key being accidentally or fraudulently revealed during transmission.

  • Users do not know the key being used. There is therefore no risk of it being revealed, either intentionally or unintentionally.

  • the encryption key cannot be lost or forgotten, thereby eliminating the risk of computer data loss through an inability toipher information.

  • The new variable length concept of the dynamic encryption key can be any length, i.e., unlimited (e.g. Vernam algorithm).

  • The encryption key is dynamic. Identical data sent a number of times will be encrypted by a different key with each transmission.

For Asymmetric Encryption

For operations that today lend themselves to the use of asymmetric encryption, such as RSA, the DKC process does not rely on a certification authority.

Highlights   |  Home  |  Comparisons  Next Page (Principles Continue)

info@fpbaudin.com