Welcome to Privacy Inside Ltd

 

The fastest most powerfully and lightweight encryption engine - Stronger then military encryption, faster then AES 


This page is intended for organizations, government, military companies,
and personal interest in new killer application evaluation of the Privacy Inside Ltd. technology.

*** this technology and non calculative algorithm will be open for all as an open source free for personal use only***

The file in this  this page, was encrypted with PI (Privacy Inside) technology, to allow you to evaluate the strength of the technology.

About the file:
the text message file encrypted with a symmetric key combine 3 modes
1st  changing the original text with random (white noise) and PHR (Pure Human Randomness) shuffle command , move and replace instruction combine with the key from mode 1 (white noise) and 2 (PHR)


2nd mode – xor PHR - Pure Human random ( or ROEE Random Oriented Enhanced Encryption) with a TIME set of instruction , and a computational temporary set of  instructions to produce a real one time PAD when every time ,

Text will transform to a cipher the last will be different


3rd  mode – xor WNS - White Noise Signal with a TIME set of instruction , and a computational temporary set of  instructions to produce a real one time PAD when every time ,

Text will transform to a cipher the last will be different

 

4th Reconstructs file, levels and dimensions to a   
this is a none mathematical with zero use of calculation algorithm - so no brute force , Rainbow Crack , or gpu cuda nvidia  brute force crack can be applied on this technology . Sorry you have to find a new way to crack chaos theory for that.

We use 0% of any mathematical calculation algorithm – so we can perform any ware with unparalleled strength

 

Key Strength - 1million bit or more
Speed performance 400% faster Compeer to  AES
MPU use - Mathematical Process Unit in CPU use 3% - 7% only
Overhead of the file from original 5% +/- (original+5%) +/-
A combination of mode 1 and 2 applied with a new variation of XOR - to perform the encrypted message

download the file in text (encrypted) from here
or
download the file in zip file from here

For cryptographic analysis we transform the encrypted file for a graphic randomness evaluation when 1 = black, 0 = white

This is a view of a regular file text file  -  not encrypted you can see the non randomness patterns all over the file - regular file link

This is a view of the encrypted message transform to graphical view - watch the smooth and the non repetitions in the patterns test file link
it is the result of use the PHR AND WNS

for more information contact us.
Thank you.
The Privacy Inside Ltd . Team
MADE IN ISRAEL