Three New Test Validations Received for Company’s Random Number Generator and Cryptographic Software NEWPORT BEACH, CA – June 1, 2020: Crown Sterling today announced that the company has completed three new test validations for its cryptography solutions. Three new tests were performed on CrownRNG™, the company’s Cryptographically Secure Random Number Generator and all received a […]read more
A New Paradigm of
Personal Data Sovereignty
Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products. From irrational numbers that modernize existing cryptography, to leading-edge encryption products and developer tools, Crown Sterling is changing the face of digital security with its non-integer-based algorithms that leverage time, AI and irrational numbers.
Mission: Personal Data Sovereignty
Protecting Our Most
Data is now the most valuable resource on the planet, securing everything from ecommerce to messaging, enterprise computing, and the most important passcodes on the planet. But it all relies on one thing: random number generation. Today’s prime number dependent encryption algorithms are at increasing risk.
High Stakes Require
The security features relied on for decades will be broken in the near future. Crown Sterling utilizes the class of artificial intelligence known as ‘Supervised Machine Learning’ which relies on linear regression as its gradient descent function, in order to generate high entropy pools of data required for random (irrational) number generation.
Many of the numbers used in today’s digital cryptography systems do not meet all of NIST standards.
The looming threat of quantum computing power is heating up the race to create a new paradigm of secure protocols.
Crown Sterling addresses this challenge without the need for specialized hardware systems, generating random numbers efficiently, consistently and quickly, achieving high entropy values.
Attacks, computing power and hacking methods have evolved and only increased vulnerabilities, as evidenced by daily news reports of serious data breaches.
Recent discoveries reveal predictable patterns previously unknown in number field theory making some widely used encryption systems vulnerable.
Crown Sterling has advanced the popular, proven and scalable Elliptic Curve Diffie-Hellman (ECDH) encryption software module by replacing vulnerable prime number Private Keys with AI-generated non-repeating irrational number Private Keys.
CrownEncrypt™• A cryptographically secure data transfer platform as a service. Crown Sterling provides core technologies for securing digital transactions, using the CrownRNG™ AI-driven engine. CrownEncrypt™ implements the proven and well-validated 512-bit Elliptic-curve Diffie–Hellman (ECDH) protocol with AES 256, in conjunction with a random irrational number generator.
CrownRNG™• Our AI-driven Cryptographically Secure Random Irrational Number Generator is a software which generates random numbers suitable for secured applications as recommended by NIST. Applications include “overlay” technology which can relatively easily upgrade outdated technologies.
The Proof is
in the Product
Crown Sterling’s non-factored algorithms leverage time, music’s infinite variability, AI, and mathematical constancies to deliver on the promise of quantum encryption without the need for specialized hardware. The proof, though, is in the product:
NEWPORT BEACH, Calif., April 20, 2020: Informa Tech Holdings LLC, f/k/a UBM LLC , the owner of Black Hat USA, and Crown Sterling Limited LLC have entered into a confidential settlement of the civil action brought by Crown Sterling relating to its participation at Black Hat USA 2019 on terms that are acceptable to both […]read more
NIST Has Issued Certificate #3635 to Crown Sterling for Completing Rigorous FIPS 140-2 Testing Process for Immediate Deployments PALO ALTO and NEWPORT BEACH, CA – April 2, 2020: SafeLogic and Crown Sterling today announced that they have worked together to receive FIPS 140-2 Encryption Validation for Crown Sterling. The FIPS 140-2 validation was granted after […]read more