AXPad Applications
#
Securing Network Traffic
#
- Encryption/decryption on Layer 2 (Ethernet)
- Encryption/decryption on datagram level (UDP)
- Encryption/decryption of bytestreams (TCP)
File Encryption and Decryption
#
- As shown on this site with the axpad application and protocol
Cryptographic Hash Functions
#
- Replacements for common cryptographic hash functions
- “Nothing-up-my-sleeve” constants basically replaced by true random material
- Application or communication channel specific “closed” HMACs
- XHA512 - XOR Hash Algorithm 512 as an example
AXPad on Dedicated Hardware
#
- Dedicated hardware implementations are comparatively easy to build
- “Algorithm-less” combinatorical Random Number Generators