AXPad Applications #

Securing Network Traffic #

  • Encryption/decryption on Layer 2 (Ethernet)
  • Encryption/decryption on datagram level (UDP)
  • Encryption/decryption of bytestreams (TCP)

File Encryption and Decryption #

  • As shown on this site with the axpad application and protocol

Cryptographic Hash Functions #

  • Replacements for common cryptographic hash functions
  • “Nothing-up-my-sleeve” constants basically replaced by true random material
  • Application or communication channel specific “closed” HMACs
  • XHA512 - XOR Hash Algorithm 512 as an example

AXPad on Dedicated Hardware #

  • Dedicated hardware implementations are comparatively easy to build
  • “Algorithm-less” combinatorical Random Number Generators