Edenprime specialises in all aspects of digital data and security through creation,
transmission, use, storage and destruction. Project scopes vary from ad-hoc consultancy
to assist with early architecture concepts and options, threat analyses of
existing systems, to full secure system designs and implementations, as well as
examination of system breaches and determination of potential countermeasures,
depending on the systems involved.
We have both implemented and used as part of secure system design many cryptographic algorithms
and other data integrity check algorithms, including CRCs, FECs, encryption, hashing, authentication
and secure key setup/exchange. In many cases the algorithms are well known and standardised, but
no suitable reference or other implementation is available (due to license constraints, unsupported
target, or many other reasons) so a bespoke implementation is needed, often optimised for particular r
esource and performance constraints.
Please note that as would be expected in this field, much of this work is highly
confidential, so only a small number of our past project work can be mentioned,
with limited information. Past work has included:
|