All Xoronos algorithms are part of a layered security architecture.
Multiple failures need to occur before the security of the cryptography we provide gets compromised.
All our security algorithms implement built in test to detect run-time failures.
Those checks are used to ensure backward compatibility, detect suspicious usage of the technology, and facilitate the diagnostic of potential problems.
We believe that the way we perform security computation should be as private as the information we want to secure.
Therefore, we do not endorse any standardization of pseudo random number generators.
We believe that the way we generate pseudo randomness should be decoupled from security algorithms.
All the security algorithms we develop are devised to support a multitude of pseudo random number generators.
Users of Xoronos technology are encouraged to individually compute their own pseudo random functions.
Those computed non-standardized algorithms can be shared among trusted people and devices.
All Xoronos security algorithms rely on provably secure technology.
The strength of the cryptography we develop is on its mathematical foundation, which is open to be inspected and verified.
We developed a post-quantum key exchange that can be used to leverage the security architecture of Xoronos cryptography.
Therefore, we can provide a safe and reliable solution for all the security algorithms in a post-quantum world.