Encryption Algorithm Customization
Standard encryption algorithms are designed for broad use and disallow or minimize control over their customization. For organizations operating under strict security or sovereignty requirements, this creates a gap between available encryption and required assurance.
Protelion security technology uses a unique data transfer protocol, which supports symmetric encryption and allows the use of different cryptography suites. That enables customization of symmetric encryption cipher deployed in Protelion products. Such customization might be done by using a family of block ciphers with a fixed 128-bit block length and 256-bit key length, built on established cryptographic principles. Those ciphers vary in depth of possible customization through a change of their parameters starting from the default set to the customer’s unique and optimized set of complex transformation parameters. This enables organizations to tailor encryption to their specific security requirements and maintain control over key management and related parameters.