STRATEGIC PROJECTS

Through projects that integrate hardware, software, and services, Kryptus offers highly customizable, reliable, and secure cyber solutions for critical applications, with state-of-the-art technology, free of surveillance laws.

Kryptus has extensive experience in Defense Projects, from tactical to strategic applications, with a unique approach to technology transfer (ToT), widely verifiable, to provide autonomy and protection to the sovereignty of nations.

STRATEGIC PROJECTS

CUSTOMIZED CYBERSECURITY SOLUTIONS, BASED ON ADVANCED CRYPTOGRAPHY
AND VERIFIABLE TECHNOLOGIES

CRYPTOCOMPUTERSCRYPTOCOMPUTERS
STATEFUL ALGORITHMSSTATEFUL ALGORITHMS
CRYPTOGRAPHIC MODULESCRYPTOGRAPHIC MODULES
icon sistema de identificacaoIDENTIFICATION AND AUTHENTICATION SYSTEMS
RISK AND VULNERABILITY ANALYSISRISK AND VULNERABILITY ANALYSIS

CRITICAL APPLICATIONS UNDER THREAT
soc

Defense, security, and intelligence lines have always been in the crosshairs of adversaries seeking to intercept stealthy communications to obtain secret information capable of compromising defense and attack plans.

Other high-impact targets for cybercriminals are related to critical infrastructure such as energy and water supply, as well as local financial institutions. The shutdown of these services or the manipulation of their operations by third parties can destabilize and weaken a nation.

Some countries even maintain surveillance laws that oblige technology manufacturers to implement imperceptible means of access (backdoors) that allow monitoring, espionage, and even sabotage in the event of a conflict with the countries purchasing these technologies.

DEFENSE AND ARMED FORCES
SECURITY
INTELLIGENCE
CRITICAL INFRASTRUCTURES
PUBLIC ADMINISTRATION

NATIONAL CRYPTOGRAPHY IS MANDATORY

To ensure the sovereignty of a nation, the development of national cryptographic resources is essential to avoid vulnerabilities and exposure of its secrets to other countries. In the context of the Brazilian Federal Public Administration, for example, it is provided by law that all classified information, of any degree of secrecy, produced, stored or transmitted, in part or in whole, by any electronic means, must be mandatorily protected with cryptographic resources based on State algorithms.

The use of locally sourced cryptographic systems is also an international practice of large nations (USA, UK, Switzerland, France, China, Israel, etc.), and is aligned with the historical perception (with a strong theoretical basis) that concerning the protection of matters of state interest there is no imported cryptographic resource considered secure and reliable.

NATIONAL CRYPTOGRAPHY IS MANDATORY

WHAT IS AT STAKE

linhaBREACH OF CONFIDENTIALITY

Data at Rest: data, documents, plans, codes, figures, designs, projects, photographs, information regarding techniques, technologies, components, equipment, facilities or automated data processing systems, in use or under development in the Country, which are considered essential for its defense, security or economy.

Data in transit: command messages, transfer of information, communication between forces, or any classified communication that impacts the position of national advantage in commercial relations, in conflicts or in the defense of national patrimony.

criptografia nacional
A STRATEGIC DEFENSE COMPANY

linha2 1MANIPULATION OF VULNERABILITIES

Sabotage: actuation of autonomous systems or devices: critical infrastructure (power plants, energy network, telecommunications, supply, finance), autonomous or remotely operated armaments.

KRYPTUS.
A STRATEGIC DEFENSE COMPANY

For contributing in several strategic projects of the Brazilian military forces and federal agencies, Kryptus has conquered the status of “Strategic Defense Company – EED” granted by the Ministry of Defense.

Kryptus is recognized as an essential partner in the search for the protection of national sovereignty in the most challenging scenarios, developing customized cyber security solutions, based on advanced cryptography and independent and fully verifiable technologies.

eed
APPLICATIONS

SECURE COMMUNICATION

Secure data link | Radio communication system

secure communication

link br2

rds defense

rondon trc

APPLICATIONS

SURVEILLANCE AND MONITORING

Sensors | Radars

survaillance and monitoring

sisfron

iff

APPLICATIONS

COMMUNICATION NETWORKS

Interoperable cryptography

communication network

communication network bloco

    DISCOVER OTHER APPLICATIONS

    TALK TO KRYPTUS  Whatsapp

    • Rua Maria Tereza Dias da Silva, 270 - Barão Geraldo - Campinas-SP - Brasil - CEP 13083-820
    • +55 (19) 3112 5000