top of page
Backdrop.jpg

VESPER - Vector Embedded Super-Positioned Encryption Rules

Key Features

Abstract Futuristic Background

Practical Size and Memory Usage

Cipher text size is twice the size of the plain text.  (Yes, plain text size times two!)  It can be configured to be more complex, but the size of the cipher text is always known beforehand and fixed.  Also, the memory buffer size can be configured to use just a few MB, but Vesper requires about 10MB of buffer memory for general use.

Small Footprint

Vesper is very small; under 100KB for most use.  Its compact size makes it easy to port and embed Vesper onto small equipment, such as a digital camera, navigation, routers, and control systems.

Performance

Vesper's core algorithms are mostly consist of integer calculations since the performance is the most important goal of the Vesper in practical and general use.  Tests show that the Vesper's performance is close to AES (as a Windows application).

1 kB Key

Vesper's 1kB (1024-byte) key is not only making cryptanalysis harder but also provides practical features, such as expiration date, original author, number of decryption allowed, and rights transferred.

Peace of Mind

With Vesper from Enigma Shade, you can have peace of mind knowing that your data is secure and protected - even when it is not in your hands.

bottom of page