Applied Cryptography: Encryption, PKIs, Certificates

Cryptography
Encryption
Authentication
Signatures
SmartCards HSMs
MAC PBE HASH
PBKDF2 PKCS
SHA512
AES RSA Twofish
Due to our years of experience in the area of cryptography, we offer the conceptual design and the development of individual crypto and encryption components. Besides encryption technologies, authentication mechanisms are part of our portfolio. Some exemplary keywords:
- PKIs, X.509 certificates, PKIX (Integration, Management, Consulting)
- Symmetric and asymmetric encryption
- Digital signatures
- E-Mail Security: S/MIME, PGP, OpenPGP, GnuPG
- Disk/File/Folder Encryption
- Password-based encryption (PBE)
- Hashing & Hash functions
- One-Time-Passwords (OTP) like RSA SecurID
- LDAP
In addition to development, our services also include consulting, training, and automation.
Contact usE-Mail Encryption / File Encryption / Full Disk Encryption
Besides developing new components, we also offer consulting in the area of mail, file and disk encryption for your business using existing software and infrastructures. We prefer open-source solutions in conjunction with standard software like Office products. However, we also know proprietary solutions on the market which might cover your specific requirements.
Other Cryptography Services
Java Crypto Solutions
Security Training