mmi@dynakrypt.com (770) 821-1614

DynaKrypt®: Three Versions

Retail Version - Running on AES platform
Enterprise Version - Running on DynaEngine
Custom tailored upon request. Contact us.
Government Version - Running on DynaEngine
Custom tailored upon request. Contact us.

What Is DynaKrypt®?

DynaKrypt® (Dynamic EnKryption), running on the DynaEngine, is a powerful encryption product based on a new encryption algorithm developed by Dr. Frederick J. Foreman, a graduate of the prestigious Massachusetts Institute of Technology (MIT). The DynaEngine is dynamic. It changes with each encryption to change information into a form so that no one can understand it except those it was intended for. Unless you have the agreed upon multi-level keys, no one on this planet will be able to recover the information that has been encrypted by DynaKrypt®.

Performance Measures

DynaKrypt® achieves the highest scores on all standards used to measure the strength of software encryption programs. These measures/tests are:

  1. Shannon File Entropy
  2. Measure of Roughness (MOR)
  3. Index of Coincidence (IOC)
  4. Measures of Randomness
  5. Compression Tests

For a single file of 16k bytes or more, DynaKrypt® averages 99.99% perfection on the Shannon File Entropy test, IOC test, and the Measure of Randomness test, 3x10-5 or less on the MOR test, and <0% compression on compression tests. This means that DynaKrypt® produces encrypted files that have no recognized patterns: as perfect as one can get.

With its multi-level encryption strength, DynaKrypt® cannot be broken by brute force; even if all of the most powerful Quantum Super Computers were to work in parallel for the remaining life of the Universe.

Advanced User Flexibility

DynaKrypt® boasts 40 necessary and flexible features. Some notable features are:
Mission Impossible Mode

One can set how data can be interacted with after a user encrypts said data, such as self-destructing itself after based on a time limit, by incorrect attempts with the correct decryption key, and how long data is able to be viewed before it is wiped from the system.

Duress Mode

For users who view security urgency as the utmost importance and need to prevent data from being leaked out to the public. One can log in under duress, and the program disables the paper trail of what the user is doing on the program, so they cannot let a thief backtrack on said user’s actions.

Differentiated Access Levels

DynaKrypt® can set which employees or users can read certain documents based on the security access the user is assigned. For example, if one only wants Level 3 users or higher to read a document, DynaKrypt® can be set so that Level 2 and below users do not have access to said document.