top of page
Лого центр at Feb 18 12-04-57 copy.png
​PU ALLBUD has participated in the fight against energy poverty

as a professional in external thermal insulation

of walls and photovoltaic panels.

PARTICULAR SERVICES


SMART HOME SYSTEMS

Photovoltaic solar panels
Exterior wall insulation
Cleaning solar panels by drone
Energy audit and global renovation
SOS heat pump repair

 
 
 
electronicdesign_29064_5gpromo2_large.jp

SAFETY
AND
RELIABILITY

The best security offers
from our partners

ADVANCED INFORMATION SECURITY PRODUCTS

 

THE NEW  SYSTEM  OF  DATA  PROTECTION NSC1500

This  system has  no  comparable  predecessors  and  will  cause a    substantial  breakthrough  in  the  area  of  cryptography.    The  design  of NSC1500  was relied  on  a  deep  theoretical  foundation;  it  was  developed  with the help of  a  new  category  of   mathematical  functions,  invented   by  the  author  of  the  system:  N  measurement   self-organizing      probability - determined     frames. This  system   of  data  protection, for many years has left behind  not only all  existing  systems, but also  are developing, including   systems  on prime polynomials   above  a   field  of    Galois   (Only in the USA several billion dollars are annually spent to search prime polynomails above the field of Galois and to develop the protection system.)

According to the Shannon  classification  the  NSC1500  system is regarded as the  absolutely reliable system. Any development of computer technology does not allow to decipher the NSC1500 system. The system cannot be deciphered even with the help of the supermodern quantum computer (After the invention of the quantum computer  the systems  RSA, PGP lost their cryptography stability).

 THE  PROBLEMS  WORKED  OUT BY  THE  SYSTEM

 

            1.The  system  provides  absolute  protection  of  the  data  in  the   computer  and in  the  process  of  the  data  transformation  from     user  to  user  on  the  whole  length  of  the  network  in all  physical     media  and  on  all   channels  (Internet,  cellular   telephone  etc).

            2.  It  provides  the  multi-user  mode  with  unlimited  number  of    users   in    the    real  time   processing  and with unlimited quantity of algorithmic bases, for each user group.

            3. It  enciphering  all  kinds  of  data:  character,  graphics,  binary.

            4. It   provides   the  mode  of  electronic  signature.

            5.The system  utterly  protects  each  user  and  station  from     imitation,  even   if 

 the  attempt  to  imitate  is    made  in  the  process  of  attaching  to  the  channel. Activity in a mode - friend-or- foe identification.

            6.   It  is  used  in  creation  of  multi-user  private   networks  of  any    configuration   on  the  basis  of  the  standard  communication     channel.

            7. Full      protection  of  station,   from   information  leakage ,   during the work   with a universal  key.  

TECHNICAL  CHARACTERISTICS  OF   NSC1500

 

              1. One  by  one  byte  data  enciphering  or  by  words  of  32,  64,  128,  256,  512, 1024,2048   bytes.( 1 byte=8 bit)

              2.   Bit-by-bit  data  enciphering   by   random  polymorphic   key  ( Random algorithm.  The  system  with  non-determined  algorithm  of  enciphering).

              3.  The  key  length  is  1024, 2048, 4096, 8192,16384  bytes  or  more    depending  on  the  mode.

              4.   The  number  of  the  independent  keys  consisting  of  casual     set  of  numbers  that  are  generated  during  one  cycle  for     each  user  is  from  10 1000    to  10 50000  depending  on  the  mode.

              5. The  processing  of  the  initial  data  (production  numbers)  for  each  user  is  fulfilling  only  once  for  all  the  time  when  the  program  is  used.  The  processing  is  carried  out  in  the  mechanical  mode  and  it  has  an  accidental  nature.  Each  user  can  possess  several  different  variants  of  the  initial  data.

              6.  The  initial  data  is  never  forwarded  by  the  network.   From  loss, the  initial  data   are protected by the random  passwords, and  stored in the coded view.    Length of  the password (30 - 40) byte

7  The  initial  data  memory  capacity (2048 - 16384)  bytes  and  the  program  with-out  cover  (10 -25)  K.bytes,  depending  upon  the  algorithm  and  the  chosen  work  mode,  which  allows  to  minimize  the  hardware  environment  and  to  install  it  in  the  compact  portable  digital  hardware,  cellular   telephone,  radio  stations,  computers  of  the  NOTEBOOK  type,  and  to create  the  multi-user  mode  with  the  unlimited  number  of  user,  as  well  as  to  use  it  in  the  electronic  payments  by  plastic  cards  and  in  the  other  hardware  (for  example:  electronic  keys  for  the  safes).

             8. Quantity of algorithms, which is implemented by a system,  is  unrestrictedly  great.

               9.  The  system  allows  to create  the  general - purpose key (universal  key)  (10 - 50)k/byte,  for enciphering- deciphering,   for  any  group  of  the  users,  each  user  keeps  his  own  initial  data  that  permits  to  create  unlimited  number  of  independent  keys.  The number  of  users  in  the  group  and  the  numbers  of  groups  is  limited  by  nothing.  Any  kind  of  dependence  lacks  between  the  user's  initial  data  and  the  general - purpose  key,  as  well  as  between  the  general - purpose  keys  created   for  the  different  groups  of  the  users.  The  presence  of  one  general - purpose  key  allows  to  place  the  program  and  the  key  in  one  integrated  chip,  that  excludes  the  initial  data  leakage  from  the  station.

            10. The system allows to work in a mode of protection from imitation ( friend-or- foe identification ) and simultaneously  to enciphering- deciphering   the  information. The mode of the authentification implements the independent randomly worked out passwords: length of the password is not less than 256 byte, a quantity is  from 10 500  to 10 5000 and more.  

             11. Enciphering-Deciphering   rate   is   from   50000  to   50000000     byte/sec  depending   on  the  mode,   computer   platform   ( Pentium,  Pentium IV),  and  the  System  of  implementation    (hardware   or  software).

            12.  The  lack  of  key  elements  in  the  enciphered  data.

            13.  The  data  capacity  is  not  augmented  after   enciphering.

             14.  The  data  is  encipher  by  bytes  or  files  which  length  is  up   to  

128 M.byte  or  more.

            15.  The  system  supports  DOS,  WINDOWS (7,8,10,2000, NT,XP),  UNIX         platforms.

            16.  The system contains in mathematical and algorithmic  implementation  a  number 

KNOW-HOW,  helped to do very complex mathematical  sums, such   as:  a  sieve  of random numbers,  generation of a universal  key,  the  installation   of  the generator   in  any  point   of  space   up   to   10 50000     etc.  

 17.  Cryptography stability  of  the  system NSC1500  is based on protection of the initial data - stored  by every user,  and  universal  key stored on  station (users or  holders of stations  can absolutely  generated  initial  data and the universal  keys).  Knowledge of algorithms  of   the program and initial  program  texts(source  code)  do not reduce cryptography  stability.

 FUNCTIONAL   SPECIALITIES

   1.  The  generator  and  the  system  are  easy  implemented  by  hardware  and  can  be  installed  in  small  portable  digital  hardware  and  the  plastic  cards.  There  are  no  small  portable  radio  telephones, cellular   telephone, radio  stations  and  plastic  cards  nowadays  which  secure  the  same  protection  and  the  multiuser  mode.

   2.  The NSC1500  system  allows  to  create  completely  protected  computer  networks  on  the  base  of  UNIX  system  with  remote  terminal  and  the  unlimited  number of users,  that  completely  satisfy  the  A1  level  (of  the  USA  national  computer  protection  center),  using  the  software  and  hardware.

   3.The  generator  possesses  a  super  high  algebraic  complication  and  a  great  degree  of  unlinear  structure ( all  the  parameters  of  the  generator  can  be  changed  to  any  side,  reducing  the  unlinear  structures  to  absolutely  any  high  power). The generator represents a N - measurement irreversible function.

    4.  The  inner  structure  of  the  generator  allows  to  realize  a  great  number  of  different  algorithmic  constructions  that  in  common  with  different  methods  of  the  data  conversion  gives  a  great  number  of  algorithms.

    5.  The  range  of  the  numbers  elaborated  by  the  generator  is  limited  by  nothing (0 - 255,  0 - 511,  0 - 1023,  etc.),  that's  why  the  system  can  work  both  with  ANSI  and  UNICODE.

6.  The  generator  allows  to  elaborate  the  random  numbers  analogous  with  those  worked  out  by  the  unreducing  multinomials  of  Galua,  but  in  any  diapason,  with  an  endless  period  of  reiteration   and in any functional   environment   The generator allows simultaneously to generate sequences with    infinite  period and with  a  step any   more (3-25): 

               a) Random uniformly  distributed  sequences  for  operation    addition at  the   modulus  N,  multiplication at  the  modulus  N.

               b) Random, uniformly distributed sequences, on all  extension of period for non-linear operation of substitution and stochastic transformation ( 256, 512, 1024 and  any  more byte  in  each  group of substitution.  Quantity  of groups by nothing  not  restrictedly). Quantity of  substitutions  (dependent on the conversed data,  or  independent  on  the  conversed  data)   from  2 8 !  up to  2 32 !  and  more.

                c) Random, uniformly distributed sequences, on all  extension of the period for  operation of commutation on  bits , or  for   operation of commutation  on   bytes  (256, 512, 1024 and  any  more byte  in  each  group of commutation.  Quantity  of groups by nothing  not       restrictedly).   Quantity  of  commutation  (dependent  on  the  conversed  data    or   independent  on  the  conversed  data)  from 2 8 !  up to  2 32 !  and  more.

 

                The NSC1500 does not have any analogs or competitors. The NSC1500 surpasses all of the best world protection systems (PGP, AES and even the US national security system A1) absolutely in all respects. In 2010, Symantec Corp. bought PGP for 300 million dollars.

Screenshot at Mar 14 11-40-40.png
9.jpg
8.jpg
1.jpg

CONTACT

Thanks for submitting!

RENT AND PURCHASE SECURE SOFTWARE AND DIGITAL INVESTMENT PRODUCTS

FROM GLOBAL IT INDUSTRY LEADERS

 

Please use the feedback form and the provided contact details to contact

the sales department and your advisory manager

PU ALLBUD Sp. z.o.o.

LUBELSKA STR. 32, PIASKI, 21-050, POLAND

pu.allbud01@gmail.com

Andriy Danylyuk
Tel: +48 570 482982

entered into the register of entrepreneurs of the National Court Register under KRS number 0000690883;

NIP: 7123345728,

REGON: 368018800

© 2024 by AmBits. Proudly created with PU ALLBUD Sp. z.o.o.

pu.allbud01@gmail.com

Tel: +48 570 482982

 
 
  • Twitter
  • Facebook
bottom of page