Kernelis Encryption addresses the issue of data protection and the prevention of malicious or accidental data modification (Surety Control).

To achieve this goal, Kernelis Encryption relies upon several computational modules that can be used independently and/or that can be directly integrated with other systems of the Kernelis software suite to enhance the data integrity and reduce the subjectivity of any human interface.

Kernelis Encryption gives means to authenticate document such as ID card, passport, driving license, data-streams... Authentication can be achieved at different levels (each level can be assimilated to a fragment). Authorization to access different levels is incorporated in the code.


Kernelis Encryption combines both encryption and steganography technologies to either protect and process digitized content or facilitate authentication of critical information. Information to be protected is first encrypted by a specifically developed process. Keys are generated by the system itself during the encryption process. Risk of logic attack is thus reduced.


The information given here after gives only indication since keeping secret the full method is part of the security.

  • The method of Kernelis Encryption uses the composition of bijective operators.

  • The composition of operators K = k1 o k2 o ... o kn is a mix of classical transformations (such as Fourier) together with other operators that were internally developed.

  • The resulting encrypted data is generally converted into a picture P that can be integrated in a pre-existing background. This integration is also controlled by an additional operator that determines which and how pixels of the background are modified by the encrypted data.

  • Since the used operators allow homomorphic encryption, the global security is improved by fragmenting F the encrypted data in multiple vehicles.

K-encryption main visual v2.png