Consulting
We offer extensive consulting services. These services include security analysis, cryptographic design, and hardware interfacing.
Key Benefits
- Experience - Over 20 years of programming experience.
- Quality - Our quality assurance program includes
thorough testing to any level confidence as well as
continuing support.
Capabilities
- Security Analysis - We will give a complete analysis of your current
configuration and recommend changes to ensure resistance to break-ins, data
corruption, and data theft.
- Cryptographic Design - We offer cryptographic designs for Public Key
as well as Private Key architectures. We can provide both RSA™ and DH compatible
public key algorithms. We can also provide numerous private key block ciphers
including 3DES, AES (Rijndael), Serpent, Blowfish, Twofish as well as our new
Q and M9 ciphers. We can also provide RC4™ compatible, ISAAC, and YARROW stream
cipher algorithms.
- Hardware Interfacing - Our hardware interfacing services include Parallel
Port and Serial Port hardware and software design. We can provide custom designs
for almost any service. We have stock designs for Hardware Random Number generators
suitable for cryptographic applications. We also provide software design for low
level interfacing of your hardware designs in ISA, PCI, Serial and Parallel Port,
USB, and Ethernet configurations.
- Training - We offer training for users within your organization