Kindi IP Encryptor is a hardware-based encryption device that enables encrypted data traffic transmitted over IP networks.
Compared to existing technologies, data is encrypted at the hardware level (L2) with the Kindi IP Encryption Device. Therefore, it offers unwavering security independent of software-related vulnerabilities.
There are many subsystems on the basis of our hardware encryption devices. We have developed, tested and used all these subsystems in real time environments for more than 10 years.
One of these subsystems where encryption algorithms work, is the FPGA system. We produced and developed all of our chip-based encryption with our “Numerical designs” which makes our product 100% hardware. It is much safer, faster and more efficient than all software and CPU based technologies.
The data traffic encrypted with the Kindi IP Encryptors provides the roaming at the network layer (L3) level with the tunneling protocol.
Kindi IP Encryption Device, customized according to the unique topology of our customers, provides a seamless and powerful solution with its user-friendly, high encryption speed and reliable digital design architecture.
With the Plug-Play-Forget principle, different types of Kindi encryptors are applicable to use in different environments. The installation is easy and requires no maintenance.
• Dynamic key exchange
• Key sharing over secure line
• Asymmetric key sharing via the management portal
• Dynamic key generation with TRNG
• Key assignment through the key port with the external device
• Automatic key management with the master device.
Our encryptors is managed with KindOS which is our own Linux based system. Thanks to KindOS, all the integrated subsystems can operate on a more reliable infrastructure.
Hardware-based and high-tech Kindi IP Encryptors are produced in four sizes to meet the different needs of various environments.
FPGA (chip) based hardware encryption
Encryption in AES 256bit,
14 round, and GCM mode.
Encryption performance up to 40Gbps
Does not affect network bandwidth, nor the other equipment on the network.
<2µS total latency.
No software vulnerabilities as Zero-Day etc.
Thanks to the sensors in the device, any physical intervention can be detected, and in case of unwanted interventions, the data is protected from the access and deletion.
• Physical tamper detection
• Active tamper sensors
• Silent central alarm
• Different tamper responses
• Emergency reset button
• Alarm port input / output