skip to main content
     
Services
Industries
Idaho Custom Encryption

Proudly Serving Idaho


Idaho Custom Encryption Since 1990

Develop secure authentication and authorization data cipher algorithms.

Did you know that industry standard encryption methods have vulnerabilities?  Think about it, if you have used an industry standard algorithm you are using an encryption method which the public knows about and is available for use.  Reverse engineering of encryption algorithms is common when they are made public knowledge.  Breaking encryption with sideways attacks is common knowledge.  New custom encryption methods derived from out of the box unconventional thinking kept close is security through obscurity. 

Quantum Thwarting

The future is encryption algorithms to thwart future quantum computer attacks.  This is especially needed with CBDC, crypto and transaction signatures.  I have been working with 4 NIST encryption quantum resistent algorithms and 2 NIST signature based technologies with digital currency/wallet transactions.

The algorithms are designed with two main goals for when encryption is typically used: General encryption, which is used to protect information exchanged across a public network, and digital signatures, used for identity authentication.  NIST said all four of the algorithms were created by experts collaborating from multiple countries and institutions.

Idaho Customers

Idaho Flag

Some information I know about Idaho is I believe the state was admitted or ratified to the United States around or about 'July 3, 1890'.  Idaho is located around latitude '44.068203' and longitude of '-114.742043' and has a population of roughly '1,839,106 million'.  If I remember correctly the capital is 'Boise' and the largest city is 'Boise'. 

My Background in Custom Encryption

I first started creating custom encryption algorithms in 1990.  So you have a better understanding on what encryption is take a few minutes and read more about encryption history below and learn how encryption is used today and which methods are more secure.  I can supply examples of certain encryption method vulnerabilities and how they have been broken.

Word of Mouth

Take a moment to read related case studies and testimonials below around my experience with Custom Encryption.



Case Study

Dimon Tobacco required a new system to handle their entire Tobacco Processing activities across their world-wide distribution channels.  Dimon hired me specifically to handle all the barcode issues for Tobacco, it's packaging and distribution across the world with the first location being Tanzania.

"It was pleasure to work with Eddie on a Major Business project at Dimon International and other multiple assignments, I was impressed by Eddie's depth of knowledge, high skill set in software development process from conception to delivery.  Eddie is a creative person.  That's him multi-skilled, forward thinking, insightful and result driven co-worker.  As a Project Manager/Barcoding Developer in his other assignments, Eddie applied the most advanced management techniques that helped project team achieve successful results.  He has very positive attitude towards work.  In depth experience and intelligence makes Eddie view solutions instead of problems."

4/22/2012
Deepak Kulkarni | USA
Project Lead
Diamond Tobacco


Introduction

The U.S.  economy fundamentally changed in the last twenty years, as manufacturing and heavy industry moved overseas, replaced by a new focus on knowledge and data.  This transformation has underscored the importance of safeguarding information through encryption.  I typically focus on state-of-the-art encryption techniques used pervasively to protect data, such as personal identity, medical records, financial transactions, and electronic mail, to name a few.

A typical approach to security is to strike a balance between apparent risks to information and efforts to mitigate those risks.  A common standard used to determine the level of security required is "commercial impracticability" - if it takes longer to access critical data than the timeframe within which its knowledge confers some benefit, practical security has been achieved.  For example, if your credit card information is protected by a system that would take the most sophisticated hacker five years to unlock, but you obtain new credit card numbers every two years on average, there will be little benefit to 'breaking' the security scheme.

If at any point you decide to reach to me just know the area codes I am familiar with for Idaho are '208, 986'.  For Custom Encryption assistance you will find my rates very reasonable for Idaho.  Now just keep in mind my time zone is 'Eastern Standard Time (EST)' and I know the time zones in Idaho are 'Most of the state: Mountain Standard Time (MST)' in case you wish to call me.  Anyway let me continue.

An important concept in security is that virtually any security system can and will be compromised eventually; it simply takes time.  For example, the Japanese never broke the code employed with great success by the Navajo code talkers in the Pacific theatre during World War II, but their code was only employed for a few years.  The success of that code was the use of words in a foreign and little-known language to represent military messages.  Had the Japanese efforts to decrypt the Navajo code focused more on linguistics than cryptography, it would have likely been just another broken security scheme in a long line of others.

Encryption

Although there are many ways to protect information from undesired access, including various physical security techniques that prevent any access from unintended receivers, it is most useful to safeguard data so that it can be transmitted over insecure networks, such as the Internet, without fear of compromise.  Since the time of the ancient Egyptians, cryptography, or the art of secret writing, has been employed to keep key information private.  History is replete with examples of the successes and failures of encryption; lives have been lost and the outcome of battles determined solely on the strength or weakness of a cipher.  This article examines the different forms of encryption, both symmetric and asymmetric, and evaluates the common algorithms and applications of encryption today.  Although you won't be a cryptographer after reading this article, you will have a better appreciation of the pivotal role encryption plays in our lives today.

Encryption algorithms or ciphers are mathematical formulas or functions applied to data to transform the unprotected information, or plaintext or clear text, into an unrecognizable format commonly referred to as cipher text. There are generally two inputs to an encryption algorithm: a key and the plaintext itself.  In some cases, the cipher text is larger than its associated plaintext or the same size.  The goal is to make the time it would take to recover or decipher the plaintext, having only the cipher text and not the key, so long as to greatly exceed the time-value of the plaintext.  Ideally, a strong algorithm and key combination should take at least millions of years to break, based on mathematical predictions.  Naturally, if an interloper manages to somehow obtain the cipher text and the key, deciphering the information is as straightforward as it is for the intended receiver, and therefore all security is lost.

Much of security is predicated on strong methods of keeping encryption keys sacrosanct, in order to force attackers to use brute-force methods, such as trying every possible key combination with the use of fast computers.  The ideal algorithm is strong, meaning that the algorithm itself is relatively impervious to direct attack, leaving attempts to derive or guess the key as the only practical avenue to breaking the encryption.  The ideal encryption algorithm creates unique cipher text from the same plaintext for each key permutation, among other traits.

You know, I don't make it out to Idaho much but I would like to see the 'Mountain Bluebird' state bird.  I am a little familiar with the Idaho 'Syringa' state flower as well.  However, I do not know much about Idaho's state tree the 'Western White Pine'.  Fishing is fun to me perhaps I would like reeling in the Idaho 'Cutthroat Trout' state fish.  Anyway, sorry I went off topic.  Let me continue.

Conclusion

The importance of computers and networks and the information they store and communicate to society today are equaled only by the threats to them.  The recent departure of Google from mainland China over a widely-publicized attack there on its e-mail system is an ominous reminder of the growing attacks on data and communication networks.  The encryption algorithms discussed in this article are in many instances the only protection between our critical information and those who seek to compromise and exploit it.  If you want to explore custom encryption, contact me.

Need Assistance?

Ever have an idea about a product or service but lack the ability to develop that idea?  Are you looking for a reliable person/firm to build your software?  Perhaps you are in need of someone to manage projects and teams?







Word of Mouth

[ Latest 10 ]

"DeFI (Decentralized Finance) Development - Personally, wrote a blockchain wallet payment solution in native C# without 3rd party libraries (such as BouncyCastle and NewtonSoft)."

2/1/2023
Eddie Drye | USA
.Net Developer
Self

"Eddie is very strong given his expertise from years of software development.  Eddie spends quality time observing things working well and also those that are not.  Based on the patterns he has always engaged with the teams to provide constructive feedback and ensured to the solution."

5/27/2023
Arun Nitta | USA
SVP - Portfolio Delivery Manager / Program Manager
Bank of America

"I highly recommend Eddie Drye for any future role as Scrum Master for software development teams.  He has a very calming demeanor, is a good listener and he learns fast.  He contributed within his first few days here and was in a rhythm quickly."

12/2/2022
Larry Imperiale | USA
Senior VP, APS&E Operational Intelligence
Bank of America

"Eddie, Fantastic update on the technical status for the Operational Intelligence body of work."

11/9/2022
Phil Rice | USA
VP Architect of Channels Technologies CTO
Bank of America

"Eddie, thanks for all you are doing.  We, ESQ and Vynamic View project team, all appreciate what you are doing.  We see improvements already."

8/26/2022
Doug Elkins | USA
VP Infrastructure Engineer II
Bank of America

"Eddie, I really like how you run the Fleet projects.  I enjoy working with you."

10/14/2021
Scott Cash | USA
Director of IT Management
Pike Engineering

"Eddie did a great job researching tons of documents to put the GSPLAD project back on track."

10/14/2019
Lee Quackenbush | USA
IAM Manager
Delhaize

"Thanks go to Wilson and Eddie for their hard work to complete these BRD/FRDs."

1/22/2018
Stephen Rossi | USA
Nitro Project Manager
Delhaize

"Special thanks to Eddie, who joined me in burning the midnight oil this week."

1/21/2018
Wilson Schmidt | USA
DiPLA Business Analyst
Delhaize

"Eddie this is a really good start at troubleshooting this! (Production Issue)"

1/16/2018
Jon Nebauer | USA
DiPLA Solutions Manager
Delhaize

Cookies preferences saved.