Select Page

HyperSphere Resources and Solutions

Shadowing Technology Fundamentals

Modern data cryptography, commonly known as data encryption, has a major problem. When a piece of data, communication, or document is encrypted, a key is created and used along with the algorithm to encrypt. The same key or a related key (in the case of asymmetric cryptography) is used to decrypt the data when its use is once again required. This key is referred to as a Master Key in this document.

United States Patent — Keyshadowing

A technique of generating key shadows performed by at least one computing device including at least one tangible computing element.