Ask us


I agree to the terms of the Privacy policy
I agree with the provisions on data protection. I agree that Protelion will process the personal data provided by me electronically for the processing of my request and contact me, according to my explicit request, for the processing of my request. I can revoke my consent at any time with effect for the future.

Thank You!

Your request was sent successfully.
We’ll answer you as soon as possible.

OK

Home

/
 ... / 

Solutions

/
 ... / 
Endpoint Protection

Encryption Algorithm Customization

Standard encryption algorithms are designed for broad use and disallow or minimize control over their customization. For organizations operating under strict security or sovereignty requirements, this creates a gap between available encryption and required assurance.

Protelion security technology uses a unique data transfer protocol, which supports symmetric encryption and allows the use of different cryptography suites. That enables customization of symmetric encryption cipher deployed in Protelion products. Such customization might be done by using a family of block ciphers with a fixed 128-bit block length and 256-bit key length, built on established cryptographic principles. Those ciphers vary in depth of possible customization through a change of their parameters starting from the default set to the customer’s unique and optimized set of complex transformation parameters. This enables organizations to tailor encryption to their specific security requirements and maintain control over key management and related parameters.

Key Advantages:

Proven Cryptographic Structure: Based on substitution permutation networks and Feistel based key scheduling.
High-Assurance Parameters: 256-bit keys and 128-bit blocks ensure strong, efficient encryption more resilient to cryptographically relevant quantum computer attacks.
Configurable Cipher Design: Controlled modification of S-boxes, linear transformations, and tweaks within a validated framework.
Independent Verification: Tools to validate configuration, implementation, and operation.
Policy-Aligned Encryption: Adapts to internal security models, regulatory requirements, and threat profiles.
Seamless Transition Path: Enables migration from standard algorithms such as AES-256.