When using various algorithms for integrity verification through network transmission section encryption and decryption, session keys are exchanged between clients and servers, and quantum-resistant encryption-based container protocols are used.
A new session key needs to be exchanged or re-exchanged every time data is transmitted. Due to the nature of quantum-resistant cryptography, a suitable method in a hybrid form is applied according to various environments.
How we are different
• Use of proven cryptographic algorithms (NIST)
• Storage of encryption keys in the white box, defense against reverse engineering attacks
• Multiple browser support