1WayFx LTD. Apps

CryptoCista 2.0
1WayFx LTD.
An unconditionally secure crypto box. Absolute control over yourprivate information. All CryptoCista data (id,keys,comments) areencrypted at all times. Ability to create your unique personalencryption system that is beyond military and security agenciesdecryption capabilities. CryptoCista rules out the suspicion ofhacking or content disclosure. Cryptosystem * The underlyingencryption does not use or relates to any known encryption systems.Fundamentals of the encryption model could be found at arXiv (http://arxiv.org/vc/cs/papers/0409/0409039v9.pdf ), enabling anyoneto verify its security by auditing the cryptosystem * Based on usercredentials (Id, Key) a dynamically unique cryptosystem isconfigured. The new cryptosystem is part of a virtually infinitefamily of cryptosystems and gives no information regarding itsunderlying algebraic structure and key space * For any Key length,the brute force is impossible on sequential machines * To bruteforce a slight Key length <= 13 there are necessary 2^92parallel machines (which is approximately the number of atoms inthe human body). The same number of parallel machines is notsufficient to brute force a Key length > 13.
Cipher Epistola 1.0
1WayFx LTD.
An unconditionally secure email application. Absolute control overyour private information. All Cipher Epistola data (id,keys,emails)are encrypted at all times. Ability to create your unique personalencryption system that is beyond military and security agenciesdecryption capabilities. Cipher Epistola rules out the suspicion ofhacking or content disclosure. Cryptosystem * The underlyingencryption does not use or relates to any known encryption systems.Fundamentals of the encryption model could be found at arXiv (http://arxiv.org/vc/cs/papers/0409/0409039v9.pdf ), enabling anyoneto verify its security by auditing the cryptosystem * Based on usercredentials (Id, Key) a dynamically unique cryptosystem isconfigured. The new cryptosystem is part of a virtually infinitefamily of cryptosystems and gives no information regarding itsunderlying algebraic structure and key space * For any Key length,the brute force is impossible on sequential machines * To bruteforce a slight Key length <= 13 there are necessary 2^92parallel machines (which is approximately the number of atoms inthe human body). The same number of parallel machines is notsufficient to brute force a Key length > 13.
Crypto Dossier 1.0
1WayFx LTD.
An unconditionally secure cryptographic system to secure files.Absolute control over your private files. Ability to create yourunique personal encryption system that is beyond military andsecurity agencies decryption capabilities. Crypto Dossier rules outthe suspicion of files content disclosure. Cryptosystem * Theunderlying encryption does not use or relates to any knownencryption systems. Fundamentals of the encryption model could befound at arXiv ( http://arxiv.org/vc/cs/papers/0409/0409039v9.pdf), enabling anyone to verify its security by auditing thecryptosystem * Based on user credentials (Id, Key) a dynamicallyunique cryptosystem is configured. The new cryptosystem is part ofa virtually infinite family of cryptosystems and gives noinformation regarding its underlying algebraic structure and keyspace * For any Key length, the brute force is impossible onsequential machines * To brute force a slight Key length <= 13there are necessary 2^92 parallel machines (which is approximatelythe number of atoms in the human body). The same number of parallelmachines is not sufficient to brute force a Key length > 13.
CryptoCQ 1.0
1WayFx LTD.
The only end-to-end encryption application that does not involveSSL, PKI, servers, Internet companies or other third parties.CryptoCQ empowers users to exchange encrypted messages via SMS(device Messaging service) and Email (device Email service). AllCryptoCQ messages are encrypted at all times and they are notstored anywhere. End-to-end encryption protocol : - Sender : Inviteselected recipient - Recipient : Accept the invitation from senderto create the end-to-end encryption protocol between sender andrecipient. How it works: - Sending a message : Send, Encrypt andSMS / Email to direct and open a device messaging service / emailservice. A new message / email will be created with all fieldsalready filled. Send to selected recipient messaging service /email service - Receiving a message : Copy encrypted message(received outside CryptoCQ application via messaging service /email service). Get, Paste and Decrypt the encrypted message.Cryptographic system: - The ability to create a unique personalcryptographic system renders an absolute control over privateinformation - The unique personal cryptographic system is part of avirtually infinite family of cryptographic systems and gives noinformation regarding the underlying algebraic structure and keyspace. Therefore, it cannot even be brute-force - Hacking orcontent disclosure of encrypted information is ruled out.Information is simply non-interceptable - Fundamentals of theencryption model could be found at arXiv (http://arxiv.org/vc/cs/papers/0409/0409039v9.pdf ), enabling anyoneto verify its security by auditing the cryptographic system.
Cipher Contact 1.0
1WayFx LTD.
An unconditionally secure contacts application. Absolutecontrolover your private information. All Cipher Contactdata(id,keys,contacts) are encrypted at all times. Ability tocreateyour unique personal encryption system that is beyondmilitary andsecurity agencies decryption capabilities. CipherContact rules outthe suspicion of hacking or content disclosure.Cryptosystem * Theunderlying encryption does not use or relates toany knownencryption systems. Fundamentals of the encryption modelcould befound at arXiv (http://arxiv.org/vc/cs/papers/0409/0409039v9.pdf), enabling anyoneto verify its security by auditing thecryptosystem * Based on usercredentials (Id, Key) a dynamicallyunique cryptosystem isconfigured. The new cryptosystem is part ofa virtually infinitefamily of cryptosystems and gives noinformation regarding itsunderlying algebraic structure and keyspace * For any Key length,the brute force is impossible onsequential machines * To bruteforce a slight Key length <= 13there are necessary 2^92 parallelmachines (which is approximatelythe number of atoms in the humanbody). The same number of parallelmachines is not sufficient tobrute force a Key length > 13.