Welcome to Privacy Inside Ltd
The fastest most powerfully and lightweight encryption engine - Stronger then military encryption, faster then AES
This page is intended for organizations, government, military companies,
and personal interest in new killer application evaluation of the Privacy
Inside Ltd. technology.
*** this technology and non calculative algorithm will be open for all as an
open source free for personal use only***
The file in this this page, was encrypted with PI (Privacy Inside)
technology, to allow you to evaluate the strength of the technology.
About the file:
the text message file encrypted with a symmetric key combine 3 modes
1st changing the original text with random (white noise) and PHR (Pure
Human Randomness) shuffle command , move and replace instruction combine with
the key from mode 1 (white noise) and 2 (PHR)
2nd mode – xor PHR - Pure Human random ( or ROEE Random Oriented
Enhanced Encryption) with a TIME set of instruction , and a computational
temporary set of instructions to produce a real one time PAD when every
time ,
Text will transform to a cipher the last will be different
3rd mode – xor WNS - White Noise Signal with a TIME set of
instruction , and a computational temporary set of instructions to
produce a real one time PAD when every time ,
Text will transform to a cipher the last will be different
4th Reconstructs file, levels and dimensions to a
this is a none mathematical with zero use of calculation algorithm - so no
brute force , Rainbow Crack , or gpu cuda nvidia brute
force crack can be applied on this technology . Sorry you have to find
a new way to crack chaos theory for that.
We use 0% of any mathematical calculation algorithm – so we can perform any ware with unparalleled strength
Key Strength - 1million bit or more
Speed performance 400% faster Compeer to AES
MPU use - Mathematical Process Unit in CPU use 3% - 7% only
Overhead of the file from original 5% +/- (original+5%) +/-
A combination of mode 1 and 2 applied with a new variation of XOR - to perform
the encrypted message
download the file in text (encrypted) from here
or
download the file in zip file from here
For cryptographic analysis we transform the encrypted file for a graphic
randomness evaluation when 1 = black, 0 = white
This is a view of a regular file text file - not encrypted you can
see the non randomness patterns all over the file - regular file
link
This is a view of the encrypted message transform to graphical view - watch the
smooth and the non repetitions in the patterns test file link
it is the result of use the PHR AND WNS
for more information contact us.
Thank you.
The Privacy Inside Ltd . Team
MADE IN ISRAEL