Cipher Contact

An unconditionally secure contacts application.

Absolute control over your private information. All Cipher Contact data (id,keys,contacts) are encrypted at all times.

Ability to create your unique personal encryption system that is beyond military and security agencies decryption capabilities. Cipher Contact rules out the suspicion of hacking or content disclosure.

Cryptosystem

* The underlying encryption does not use or relates to any known encryption systems. Fundamentals of the encryption model could be found at arXiv ( http://arxiv.org/vc/cs/papers/0409/0409039v9.pdf ), enabling anyone to verify its security by auditing the cryptosystem
* Based on user credentials (Id, Key) a dynamically unique cryptosystem is configured. The new cryptosystem is part of a virtually infinite family of cryptosystems and gives no information regarding its underlying algebraic structure and key space
* For any Key length, the brute force is impossible on sequential machines
* To brute force a slight Key length <= 13 there are necessary 2^92 parallel machines (which is approximately the number of atoms in the human body). The same number of parallel machines is not sufficient to brute force a Key length > 13.
Read more
5.0
2 total
5
4
3
2
1
Loading...

Additional Information

Eligible for Family Library
Eligible if bought after 7/2/2016. Learn More
Updated
February 8, 2016
Size
350k
Installs
10+
Current Version
1.0
Requires Android
3.0 and up
Content Rating
Everyone
Interactive Elements
Users Interact
Permissions
Offered By
1WayFx LTD.
Developer
401 738 Farrow St., Coquitlam, BC, Canada V3J7V4
©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.