AXPad Applications #
Securing Network Traffic #
- Encryption/decryption on Layer 2 (Ethernet)
- Encryption/decryption on datagram level (UDP)
- Encryption/decryption of bytestreams (TCP)
File Encryption and Decryption #
- As shown on this site with the axpad application and protocol
Cryptographic Hash Functions #
- Replacements for common cryptographic hash functions
- “Nothing-up-my-sleeve” constants basically replaced by true random material
- Application or communication channel specific “closed” HMACs
- XHA512 - XOR Hash Algorithm 512 as an example
AXPad on Dedicated Hardware #
- Dedicated hardware implementations are comparatively easy to build
- “Algorithm-less” combinatorical Random Number Generators