The Strive for "Perfect Security"
A secure method of continuous key delivery over the internet for One-Time Pad Symmetric Key Encryption.
This enables the most secure messaging system ever invented.
The Father of
Information Theory
In 1949, Claude Shannon proved mathematically that One-Time Pad (OTP) symmetric key encryption was "unhackable" and could provide "perfect secrecy". This remains true today, even with unlimited computing and the inevitable quantum computing advancements.
Claude Shannon's theories are the foundations of Matrics2's key delivery.
Purpose
Our mission is to develop, deploy and proliferate our platform across several verticals that will enable the most secure encryption system ever invented, one-time pad, random number, symmetric keying. We aim to provide a quantum resistant method that will curb the $6 Trillion cybercrime industry. The loss to cybercrime is expected to grow to $10.5 trillion by 2025 .
Mission
The Matrics2 vision is a world with “perfect security.” A large scale delivery of symmetric keys to customers throughout the world to provide secure communications between entities.
Vision
I don’t hear much anymore that puts a smile on my face, but this does. You have done something the industry has not been able to do. This will replace Diffie-Hellman."
Michael O'Dell
New Enterprise Associates (NEA) Senior Scientist
Intrigued?
Want to Learn More?
Reach out to learn how to scale across your enterprise.
This is very clever, and we envision it as the universal key exchange mechanism for the distribution of symmetric keys."
William P. Crowell
General Partner, Alsop Louie Partners
Matrics2 solution is a true paradigm shift.
Chuck Brooks
Georgetown University Professor
"Top Tech Person to Follow" by LinkedIn
Our Technology
Matrics2 has developed a secure software key distribution system that delivers 256 bit, true random numbers to be used as symmetric keys for clients securely across the internet. Our patented solution is rapidly scalable that enables ubiquitous use of one-time pad symmetric key encryption for secure data transport. The approach provides network managers the ability for integration across a wide variety of applications. With authentication built in, it also eliminates the use of passwords. Create a secure and closed network coexisting on the internet.