Top of Page
Click or Press Enter Here To Go Back To The Computer Science Page
Click or Press Enter Here To Go Back To The Main Page
Page Title: Cyber Security Research Group
Bold Text: The more heavily we depend on technology, the more vulnerable we become
The High Encryption Standard is digital data security model based on a series of protocols and patented cryptographic technologies. With this standard, encrypted data transmitted, or stored, will never again be breached by an external attacker. Infinite computational power is, and will remain, insufficient to “crack” or otherwise retrieve data encrypted with our system. The only possible means to attack the security of an H.E.S. platform is an endpoint breach, and we have cutting-edge protocols and technology in place to resist even that. The H.E.S. model can be applied to synchronous or asynchronous digital data transmission and storage.
Every new encryption standard is simply increasing the amount of computational power required to defeat it. This means that data you secure today with AES or RSA will be at the mercy of future computers. By the time computational power catches up to your encrypted data, can you be certain that it is no longer sensitive? The High Encryption Standard represents the future and pinnacle of prearranged channel encryption.
Quote Attribution: James P. Morgan
Bullet List Title: Some potential applications include
Item 2: Secure command, control, communications, and telemetry systems
Item 3: Secure voice, chat, and file transfer software
Item 4: New wireless security standards
Quote Attribution: James P. Morgan
This is a Link: Click Here for More Information.
Bullet List Title: Current Projects
Item 1: H E S Compliant Network Infrastructure Hardware [Status: Research and Development]
Item 2: H E S. Compliant Mobile Phone Application [Status: Research and Development]
Click or Press Enter Here To Go Back To The Computer Science Page
Click or Press Enter Here To Go Back To The Main Page