clevX “Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away.”
- Antoine de Saint-Exupery
clever eXtention
   
BrandPad
ChargeX
CloudKey
DataLock
DataLockMgmt
DataLockRemote
DataLockRNG
DataMouse
DriveSecurity
FlashBack
FoldIT
PowerSmart
RFID Inline
TrustedToken
 
Help Us To  Help You

Technology Platforms and IP Portfolio

DataLockRNG

Problem:

Encryption based products are only as good (as secure) as the key used for encryption. Many existing Random-Number-Generators (RNGs) do not have sufficient entropy to thwart brute force attacks.

Solution:

DataLockRNG is an implementation of the hash_DRBG algorithm as defined by NIST SP800-90 using SHA-256 as its hashing function. A 256 bit non-deterministic entropy source is input to the deterministic hash_DRBG algorithm (NIST Validation No. 164 and 177). This means identical units will generate a unique sequence of random numbers.

It's available as a stand-alone IC for integration with customer products. Access to random number functions is via a serial interface (I2C, RS-232, or SPI). Possible uses include the generation of an encryption key for secure mass storage*, as a source of random numbers for door locks, or a source of private keys in a web based application.

Click here – to contact us about licensing opportunities.

*Approved to Level 3 (see DataLock FIPS for examples)

Home | Technologies | Applications | Licensing | Media | Company