Helix© is NabruTech's proprietary encryption algorithm. Built as a six tier cascade encryption algorithm, Helix© is comprised of symmetric and asymmetric ciphers, trusted devices, and utilizes time-rolling technology giving it down to the second verification.
NabruTech uses a number of encryption ciphers, all custom constructed for security, and implemented time-based rolling verification technology to ensure the most secure platform on the market. Built with both file encryption and transactional security in mind, Helix© is a versatile algorithm capable of a multitude of applications.
Tesseract Vault is a new, highly secure, cloud storage provider that utilizes the Helix© encryption algorithm to encrypt files for storage. Server security aside, Tesseract Vault stores your files as encrypted files, giving a superior layer of protection and comfort in knowing that each client has the only key able to decrypt and view their files.
Storage access is available from any of the account holder's trusted devices, and file sharing between accounts is also available with administrative approval. Each of your trusted devices will be encrypted, logged, and kept on file on our servers.
With each file uploaded, you will have the ability to use a master account password, or assign a new password for use on that file only. All passwords will be integrated into the Helix© algorithm and will be used to lock and unlock the files they are assigned to.
An algorithm is a procedure or formula for solving a problem, based on conducting a sequence of specified actions. A computer program can be viewed as an elaborate algorithm. In mathematics and computer science, an algorithm usually means a small procedure that solves a recurrent problem.
Algorithms are widely used throughout all areas of IT (information technology). A search engine algorithm, for example, takes search strings of keywords and operators as input, searches its associated database for relevant web pages, and returns results.
An encryption algorithm transforms data according to specified actions to protect it. A secret key algorithm such as the U.S. Department of Defense's Data Encryption Standard (DES), for example, uses the same key to encrypt and decrypt data. As long as the algorithm is sufficiently sophisticated, no one lacking the key can decrypt the data.