Security Algorythms

Some might wonder why we build custom security algorithms for us customers. There are two types of encryption either symmetrical (can be decrypted) or asymmetrical (once encrypted they cannot be decrypted). Many people believe that when they use security encryption systems like MD5 and SHA their hash encrypted items cannot be decrypted. While it is technically impossible to decrypt the hashed strings, there are sites that have dictionaries with millions of hashed codes and their string equivalents. These dictionaries allow people to put in a hash code and it will look the value up in a database and find the password. Clever and it makes these standards insecure. 

 

An example of one of these sites is:

 

https://hashkiller.co.uk/md5-decrypter.aspx

http://shadecrypt.com/home

 

So, we created new 256 hashing algorithms that are unique to the client meaning that it is useless using these dictionary sites which make our customers secure.