FN deploys industry standard cryptography to protect data ‘at rest’ and ‘in-transit’, specifically:
However, FN also utilizes super encryption where data is encrypted both by one or more of the above algorithms as well as FN’s diversified block ciphers (patent pending) and/or homophonic ciphers to more effectively protect data in motion/memory. The primary purpose of these alternate cryptographic methods is to more effectively address what is known in industry parlance as “the key hiding problem”, a problem for certain, but the sue of the words key hiding to describe many current standard implementations could only be described as a misnomer. Said another way, although modern cryptography provides unequivocal potency vs. brute force attacks against data at rest and in transit, its Achilles heel is the protection of data at runtime. As such, the primary focus of FN’s ‘non-standard’ cryptography is in fact the protection of data at runtime, ‘in memory’. Simply put, our solution direction is driven by a belief that diversification and speed are more important than potency in runtime environments and as such developed the solutions that we have.
Additionally, FN also utilizes steganographic methods again also in a super encrypted manner, as related primarily to certain forms of content, including but not be limited to pictures.
We would be completely remiss if we did not thank the modern cryptography “intellectual giants” upon whose shoulders our small advancements clearly stand, for without their collective genius, there would be no hope for software security. So as security practitioners as well as citizens of the internet, we submit our deep thanks, gratitude and awe at the pioneering work and tremendous achievements of … James H. Ellis and British GCHQ scientists, as well as Diffie, Hellman, Rivest, Shamir, and Adleman for their groundbreaking work in Public Key Infrastructure (PKI) as well as and others at who developed the protocol.