It reduces the threat of breach of the integrity, confidentiality and data authenticity within the organization using the data protection in the information-analytical systems (IAS).
The software combines the matrix affine transformations, multi-round actions with different keys (including the keys based on the Fibonacci matrices of high dimensionality), and exchange algorithms that in general significantly increases the reliability of the data protection software system.
simple and fast algorithms of the data encryption;
the unique algorithms to generate the encryption keys;
effective expansion of the set of encryption keys for the multi-round system of data transformation;
fast updating of SW;
low price.
data protection from the gangland, violations of the law , and unfair competition; industrial and commercial activities, informational and personnel provision, insurance, etc .; authentication and authorization of the users , identification of fraud and risks, ensuring the regulatory requirements.
joint study of the cyber security of e-information; refinement of the software development to the level of commercial product.