Skip to content

Solutions

The IPK® Solutions Approach

IPK® Underlying Premise: Use what’s HERE (Forward Error Correction or FEC), UNITED with Security Protocols...

IPK Solutions Approach

Zero Overhead Encode (ZOE) – uses existing compute processing

  • Supports ALL NIST Approved Ciphers, including your favorite AES encryption ciphers
  • Post-Quantum Code-based Encryption approach (Classic McEliece)

Significantly INCREASE Network Throughput while IMPROVING Link Security & Robustness!

Delivers MAJOR Energy Efficiencies from REDUCED Processing Overheads!

Simple & elegant – solves the four mega issues, and innovates what’s been “hiding in plain sight!”

IPK® Secure Speed

IPK® is a patented software protocol that ties cryptographic variables to system variables including Modulation, Device Authorization and Authentication.

  • IPK® “essentially scrambles and encrypts channel coding in part by randomizing the graph base of the LDPC channel coder/decoder

Wait, there’s more… IPK® further cyber protects your data by allowing the user to multiply the complexity... add in one or all of IPK®’s “wheel of ciphering options” to each block or packet in your message.

A simple improvement is to deploy IPK® Secure Speed across your network and allow the user or application owner to apply their own preferred encryption approach.

The benefits of this deployment approach are:

  • The network operates with the highest throughput and performance.
  • All data is 100% IPK-ZOE secured (IPK®-zero overhead encode).
  • The user or application is further secured to their preferred level of compliance.
  • The encryption compounding effect is avoided.
    • no more multiple, heavy compute ciphers at different layers in the stack.
  • Network latency is eradicated.
  • Compute economies and energy efficiencies are achieved.

OSI Stack

  • Layer 5 - Any Application or Website Layer
    • PERFORMANCE
  • Layer 3 / 4 - Cybersecurity in Network/Transport Layer
    • EXISTING MADE BETTER
  • AES256 encryption is 681 nS per block (14 cycles, often repeated) versus IPK is 13 nS per block (1 cycle)
  • Layer 1 / 2 - Cybersecurity in PHY (Physical Layer)
    • GAME CHANGER
OSI Stack - IPK Solutions
IPK® Secure StorFast - IPK Solutions

Extending the IPK® paradigm further along the line into the Storage domain delivers impressive results. Incorporating IPK® Secure StorFast in your storage environment re-sets the benchmark for data I/O and retrieval.  In an environment where milli-seconds micro-seconds and nano-seconds are the be all, applying IPK® within the Forward Error Correction (FEC) processing for Storage creates an acceleration in I/O and a profound improvement in data storage volume economies with almost a doubling of the storage capacity of your existing storage assets!

To learn more on how we can deliver profound outcomes in data storage, contact us for a conversation.

IPK® Software Development Kit (SDK) - IPK Solutions

Available with our software development kit and supported by the IPK® Technologies’ Engineering Team, establishing a Proof of Concept (POC) is relatively quick and delivers a clear result:

  • How much improvement could you see in your environment?

Working with our Test & Measurement Partner, and Coming Soon to IPK® Prospects will be the capability to emulate your environment in detail and demonstrate the “Art of the Possible”.  Check-in with us on how you can get insight into where performance enhancements might be available in your environment.

Solutions: Software: 40KB, No New Hardware Required

Software: 40KB, No New Hardware Required

Solutions: Optimizes Performance: Up to 300% network throughput increase

Optimizes Performance: Up to 300% network throughput increase

Solutions: Supports NIST Ciphers a-la FIPS 140-02 and aligns with NIST Post Quantum Code-based Encryption submission

Supports NIST Ciphers a-la FIPS 140-02 and aligns with NIST Post Quantum Code-based Encryption submission

Solutions: Reduces Energy Consumption: Reduced processing = energy savings

Reduces Energy Consumption: Reduced processing = energy savings

Solutions: Fits In All Networks: Physical Layer to Application/Presentation Layers

Fits In All Networks: Physical Layer to Application/Presentation Layers

Increases Security: Dynamic-change key lengths and/or key content

Increases Security: Dynamic-change key lengths and/or key content

Improves Storage: 3x faster storage disk write throughput

Improves Storage: 3x faster storage disk write throughput

Large Market Applicability: 5G, Satcom, Cloud Computing, IoT

Large Market Applicability: 5G, Satcom, Cloud Computing, IoT