Bonafeyed Technology

There is a lack of awareness and understanding regarding how to protect data. It is commonly, and incorrectly believed that SSL protects data from hackers, when actually, it only protects the transportation of the data between two end-points. Data protection compliance checklists don’t confirm that the data is properly protected, only that “somewhere” encryption is utilized.

The frequency of breaches arises from focusing on perimeter security and not on protecting the data itself. Data that remains in the “clear” is vulnerable. Bonafeyed is capable of securing data elements individually such that any loss of data whether by a large breach or down to an end-user’s mobile device is mitigated. Traditional bulk encryption and perimeter products clearly don’t cut it. Otherwise, these massive breaches and data exploits would not be occurring.

At the core of Bonafeyed’s technology is an 800-bit stream cipher algorithm based on the industry hardened Mersenne Twister derived PRNG keystream. This patented approach requires low compute resources that allow live encryption and decryption at the user’s endpoint device. Depending on the clear text, Bonafeyed’s cipher engine is 6 to 20 times faster, a high quality 2^800 period and a larger cipher block table than competing 256-bit block ciphers. It interoperates with all security solutions including Prevention, Detection, Transport, and Storage.

Other advantages of Bonafeyed’s technology approach include:

Key management is performed using an innovative Group management approach. Keys are associated with a Group (one or many users). Users can easily be identified by an email address. Additional life-cycle key management features include:


Encoding/decoding message by selectively adjusting characteristics of sub-units in image data

A message can be encoded in an image file by mapping at least one bit of the message onto each sub-unit of the image file, and adjusting a distinguishable characteristic of each sub-unit according to the corresponding bit to produce a modified image file. The message can be decoded from the message file by comparing each sub-unit of the modified image file with a corresponding sub-unit of the original image file, and identifying at least one bit of the message based on each comparison.

Patent # 9,514,504

Use of 32-bit Random Numbers to Produce Cipher Key Stream for 8-bit Data Stream

A method of enciphering information comprises generating five index values by performing modulo division on a 32-bit binary input value, identifying five 8-bit output patterns based on the five index values, and enciphering or deciphering five bytes of text using the five 8-bit output patterns.

Patent # 9,246,681

Contact us at to request pricing and a demonstration.