A New Class of Encryption Keys From Internet Promise Group Are So Virulent and Ephemeral They End All Debate on Encryption
Los Angeles, CA, July 30, 2016 (Newswire.com) - Internet Promise Group (IPG), a U.S. based technology conglomerate, has developed and patented a new class of encryption keys branded “RDK”, or Random Dance Keys. A key feature of RDK is Random Dance Keys are so virulent and ephemeral they cannot be broken by brute force methods.
While mathematical scientists and researchers in the field of data-security are focused on the challenges in creating more advanced encryption algorithms, RDK was conceived by inventor Tara Chand to create innovation in the encryption key space itself, which for everyone else is just a random sequence of bits, such as 256 bits.
"RDK are only created at the time of actual use for encryption or decryption, not before, and then immediately discarded after one-time use to ensure security of cyber-data communications."
Tara Chand, Founder & CEO Internet Promise Group Inc.
Mr. Chand conceived, developed and patented this new class of RDK encryption keys to be not only unbreakable, even by brute force methods, but also impossible to steal, and focused his innovation skills exclusively on the encryption key itself, not the encryption algorithm.
A key feature of this new class of encryption keys, or RDK keys, are that Random Dance Keys are never stored anywhere, and created at the spur of the moment only when needed by the existing encryption algorithm, and then immediately discarded.
Another key feature is Random Dance Keys are generated randomly for every data block, within the secure communication channel, and are different per packet and per direction.
According to Mr. Chand, “RDK are only created at the time of actual use for encryption or decryption, not before, and then immediately discarded after one-time use to ensure security of cyber-data communications.”
Mr. Chand explained, “RDK works by creating a random wave envelope that generates a perpetual sequence of truly random encryption keys at both ends of the communication channel. RDK uses existing encryption algorithms and an existing encryption key as a seed, and thus does not displace current systems and methods of encryption technology.”
Mr. Chand turned his attention to innovating multiple applications for RDK technology in the U.S. private sector – which could immediately solve and eliminate privacy and security issues for major business enterprises like Apple and Facebook, financial institutions like Chase and Wells Fargo, and U.S. Government agencies – providing privacy and security for communication between different networks & people communicating over wireless devices.
After Mr. Chand had innovated RDK, he contacted the NSA several years ago, thinking RDK technology could prove a valuable security asset for them; the NSA responded they only use NSA developed encryption and were not interested in encryption technology from outside parties.
The U.S. Department of Defense spends billions every year to create, store, safeguard and distribute encryption keys used in the various agencies of the DoD, and Mr. Chand still believes the U.S. Government could have used RDK for their immense benefit in multiple critical security applications.
RDK are for use in three different applications, which include (a) nationwide wireless networks used by people on the move connecting to their business networks, (b) end-to-end security for smartphone communication between private parties, and (c) between nation states collaborating in an ad hoc theatre of defense operation. RDK may also be used for secure data storage in the cloud or with business data systems.
Depending on the specific application environment, RDK can be implemented in hardware, firmware, or software – and RDK is available for license to any interested business or government agency.
U.S. Government encryption algorithms are either in the public domain or remain highly classified for security purposes; however, it is just a matter of time for adversaries using brute force computer processing power to discover an encryption key and break any encryption – or just simply steal an encryption key by breaking into even the best defended computer networks.
Tara Chand is the founder and CEO of Internet Promise Group (IPG). IPG is a unique innovation enterprise that was founded by Tara Chand in January 2000. Through his creative efforts, the company has built a large and diverse capital asset base of Intellectual Property.
A prolific inventor, Mr. Chand has organized this broad array of IP assets across seven different market verticals (www.internetpromisegroup.com). IPG is planning to go public in the near future with an announcement of a major International IPO.
Media Contact: Spencer Clark at (310) 787-1400 or email@example.com.
Source: Internet Promise Group Inc.