Home > ASBE Algorithm
ASBE Algorithm

An element of stealth is required to effectively navigate today's uncertain cyber terrain. Anti-Statistical Block Encryption (ASBE) fulfills this prerequisite with breakthrough innovation, designed to defeat the attack models and methods of Cryptanalysis and Statistical Analysis.

ASBE prevails over criminal attack with the advancement of variable-length keys, which scale in size from 2008 bits up to 2 GB, and are reinforced with passwords up to 64KB. ASBE keys and passwords are created-used-destroyed at each end-point. 

Key transfer is no longer necessary. Costly Public Key Infrastructure (PKI) is eliminated. 

ASBE is approved ECCN 5D992c for export, OFAC compliant, and enables companies with HIPAA, HITECH, and FDA compliance.

While the security industry struggles to fend against the precarious cyber environment, leading-edge ASBE technology protects clients against present-day threats, and positions foresighted organizations with their 'next-generation security' already in place.

The ASBE algorithm differentiates from its encryption predecessors to overcome inherent risks, which are subject to today's increasing computer power and contemporary criminal technique.

Security Strengths:

  • The algorithm is not subject to attack models and methods of Cryptanalysis.
  • Byte frequency cannot be used against it.
  • A mathematical approach of factoring, ECDLP, or similar analysis cannot be used against the algorithm, which uses a sequence of non-linear steps and exhibits no periodic repetition.
  • Key generation, communication, and storage cannot be detected or intercepted, as parameter-controlled keys are generated-used-destroyed-recreated, on demand.
  •  Key transfer between end points is not necessary.
  • The encryption engine scrubs memory before exiting so the key, password, and other parameters are not available to be discovered by another program, which allocates all available memory to examine its contents.
Game Changers:
  • Described as anti-statistical + key-dependent block encryption,
  • ASBE uses blocks as part of the algorithm. These blocks are manipulated in ways different from all currently known and published existing encryption algorithms in a variable way, which depends on the key.
  • Variable key length scales between 2008 bits and 2 gigabytes. No two encryptions are alike.
  • Passwords scale to 64K bytes in length.
  • ASBE always produces different cyphertext with varying length, even when repeating the same data input, same key, and same password.
  • ASBE's small footprint satisfies restricted memory requirements with its less than 25KB in-memory solution and less than 71KB file-based solution.
  • The
  • encryption software is portable to any CPU. Payloads can be transmitted by any communications protocol and on any network.