CKrypt

Hybrid AES-256-GCM + KSP-64 encryption for military-grade dual-layer data security

Encryption Module

All data is processed locally - never leaves your device
Weak Strong

Decryption Module

Security Protocol

Military-Grade Security

Our encryption system combines multiple security layers:

  • AES-256 encryption with Galois/Counter Mode (GCM)
  • CKRY transformation with triple symbol substitution
  • Key derivation using PBKDF2 with 210,000 iterations
  • 256-bit encryption keys generated from passphrase
  • Authentication tags to prevent tampering
  • Perfect forward secrecy implementation

Encryption Process

Key Derivation

Your passphrase is transformed into a 256-bit encryption key using PBKDF2 with SHA-384 and 210,000 iterations

AES-256 Encryption

Data is encrypted using AES-256 in GCM mode, providing both confidentiality and integrity with 128-bit authentication tags

CKRY Transformation

Encrypted data undergoes CKRY transformation with triple symbol substitution for added security and obfuscation

Security Best Practices

  • Use passphrases with at least 16 characters
  • Include uppercase, lowercase, numbers, and special characters
  • Never reuse passphrases across different systems
  • Store your passphrase securely using a password manager
  • Change passphrases every 90 days for sensitive data
  • Enable two-factor authentication where possible

CKRY Algorithm

CKRY Transformation

The CKRY transformation adds an additional layer of security to the AES-256 encrypted data:

  • Triplet Symbol Substitution: Each character is replaced with three symbols from a 32-character set
  • Key-Dependent Mapping: Transformation is uniquely derived from the encryption key
  • Obfuscation: Makes encrypted data resistant to pattern recognition and frequency analysis
  • Entropy Enhancement: Increases randomness of the output ciphertext
  • Tamper Resistance: Any modification to ciphertext invalidates decryption
Operation completed successfully
Initializing Cryptographic Modules