ASYRIC is a mobile application allowing the user to securily communicate with other users in the form of real-time calls and text messages.
ASYRIC uses the latest encryption for the communication security – the encryption is based on Elliptic Curve Cryptography (ECC). The application not only enables secure messaging but also encrypted real-time calls.
Application can be downloaded for iOS and Android devices. We will shortly introduce the desktop version for Windows and MAC OS X.
Certainly, the communication only requires internet connection.
2. SECURITY AND PRIVACY
– information misuse
– position/location and activity monitoring
– sensitive data hacking
– commercial secrets disclosure and many more
Communication security is ensured by encryption algorithm SES (Salutis Encryption System); read more
SES algorithm is designed as the combination of specifically modified AES (Advanced Encryption Standard) widely used today and the latest viable encryption based on elliptic curves ECC (Elliptic Curve Cryptography). read more…
You can transmit text messages and real-time calls at present, however we are adding files and attachments transfer, shortly.
Only the intended individual users (sender and recipient) can access the information transmitted via a message or a call. There are obviously surveillance methods allowing communication capturing, however being unable to decrypt the data or knowing the private keys of the involved communication parties is what makes it impossible to decrypt the data transmitted, not even us.
Only the necessary data for pairing the applications and communication are stored on the server. The actual communication is never stored on the server after delivery to recepient’s device.
The encryption is strictly based on mathematical algorithm SES, thus does not require further third-party certification, which may cause uncertainties about the security breach and/or ‘backdoor’ access.
The encryption keys are automatically generated on the actual devices where ASYRIC is installed to maximize SES algorithm implementation and security.
Public keys are automatically distributed in the background between the devices while communication is established.
The user decides how accessible his/her public key is. It is indeed totally secure even in case the public key is publicly accessible anytime to anyone as its role is to establish the communication and does not affect communication security.
No, it is impossible to decrypt communication with the public key only. Knowing the private key as well is requisite for decryption.
No, this is possible. SES algorithm uses public key encryption specifically because it is impossible to retrieve the private key.
None of the existing applications or systems are capable of decrypting or detecting the key used for SES algorithm encryption. It is highly infeasible that such a system will be developed to accomplish this.
It is possible to get hold of encrypted messages given specific circumstances (physical device theft, malware infection of the device), however it is impossible for anyone to uncover the information in the message, not even our organization. So practically, such a situation is totally safe from the ASYRIC user perspective as all messages are encrypted with SES algorithm before they are sent to the recipient.
It is not possible, communication only works and is safe if both sides have installed ASYRIC on their devices.
When you first install the app, the necessary security operations automatically generate the public and private keys in the background for a completely secure and automated process. When the keys are generated and paired, the notification is displayed and you are all set to securely chat and call with other users. All necessary security operations are generated in the background without any need for user’s involvement for a completely hassle-free outcome.
You can communicate with all the users in your contact list, however with only the selected one at once. We will provide multi-chat and group calls in the coming updates.
4. User manual
You may use the application only on a specific device where you have purchased the license, especially for the sake of your utmost security. If you change your device however, your license may be transferred onto the new device with automatic generation of completely new keys.
We can nullify your private key and cancel your license on the lost or stolen device and generate completely new private key for the new device.