pauca sed matura - gauss

Krypto-Key Set / 256 - 4096 bits / CS ###

Custom Coding System

MX$120.00

At Krynergy Labs we offer Cryptographic Keys from 256 to 4096 bits (or even bigger as you request), computed  with The * Gauss-Jacques * Numerical Method, to Guarantee Maximum Security for your Costumers' Digital Data.

If you buy this product you accept our terms and conditions. The copyright proprietor has licenced these files (including its content) for private use only. All other rights are reserved. Any unauthorized copying, editing, renting, exchanging, lending and/or a form of diffusion of the key-sets you acquired is strictly prohibited. Therefore the information is not to be sold by way of trade without a proper licence from Krynergy. 

Krynergy is not responsible for the use of this product. Responsibility lies with the purchaser, user and implementer, acting within their own capabilities and free will.

The Key-Sets we provide are computed with the "Gauss-Jacques" numerical method. All rights reserved.

The implementation of the digital keys is very simple, aiming that any user would be able to apply them. To open the files, just doble-clic on the selected one. Once opened, you'd be able to see a square matrix composed by many natural numbers. You can distribute them in your tech-environment as needed. That, or you can use simply the file to encrypt/decrypt as follows:

Action & Result

  • keyToEncrypt.txt <fileSelection> To load the digital-key to Encrypt a File.

  • keyToDecrypt.txt <fileSelection> To load the digital-key to Decrypt previous encrypted File.

  • keyToEncrypt.txt <file> Refers to the Key you'll use to close (plain) selected data.

  • keyToDecrypt.txt <file> Refers to the Key you'll use to open (cipher) selected data.

Mnemonic name is given to indicate bit-size and coding. This is, 'keyToEncrypt_4096_256.txt' file name, stands for a 4096 bit-size and ASCII coding. If the coding number isn't 2^n, then you are free to define your 'skalar field' as you wish, but with some considerations. You will need a programming function to read the files and compute the encryption/decryption process in symmetric mode; i.e. Hill-Cipher, Diffie-Hellman, etc. On your keyboard <Ctrl-C> it to copy the matrix given & <Ctrl-P> to paste it in Windows/Linux OS. In the same fashion <Cmd-C> & <Cmd-P> can be used in Mac OS. Now, the ordered computed numbers that compose the matrix -to Open or Close any data- are ready to be part of your work in a certain software you choose.