Welcome to Audacious Designs, LLC.!

Audacious Designs, LLC was created in September 2012 to become the premier clearinghouse for creating, nurturing, and finding path-to-market opportunities for new paradigm shifting technologies and innovations that are, as the company’s name implies, audacious in their design and nature, as well as in their profit potential. Their first major innovation has been Felician Randomized Encryption (FRE)™, a ground breaking, patented encryption methodology and architecture that protects companies and agencies in the event their databases are hacked. (Patent #9,397,830). See our Capability Statement.

Felician Randomized Encryption (FRE)™ for Superior Cyber Protection!

Audacious Designs has come up with a game-changer. Encryption that randomly changes every time, and which can only be decrypted by meeting user-defined conditions. Encryptions can be set to expire, or only decrypt on a company’s specific hardware, or by a Trusted Associate. By using FRE™, a company could ensure that their data was secured, even if it were stolen, and even if the thief had the password. Now, there’s something that can come in handy!

Advantages of FRE™

Using FRE™ as your encryption protocol offers advantages over outdated encryption standards:

  • FRE™ is non-deterministic. This means that unlike most encryption commonly in use (like AES), every time FRE™ encrypts text, the resulting cipher text will be random in composition and size, even if encrypting the same plaintext over and over again. This has the advantage of denying hackers and other nefarious entities from having any repeating pattern to identify or track. It does this by breaking the text being encrypted into multiple randomly sized blocks, and generating random keys and encryption patterns for each block, and using the password submitted to change how math works within the algorithm three times per block, as well as other features to make its effective key strength stronger than previous encryptions.
  • FRE™ is text-based, unlike most encryption, which usually works at the bit level, which is cumbersome to use within programming and text-based solutions. Being text-based allows FRE™ to more easily be incorporated within programming, and text-based languages and solutions (such as HTML, XML, or JSON), within which FRE™ is made compatible by removing conflicting characters from the resulting cipher text.
  • In addition, optionally, users may add additional policy rules and constraints, embedded within the encryption itself, such as time or GPS or device ID constraints, or limiting decryption to only being possible under specific conditions, and or only to specified trusted entities. By adding these additional conditions, FRE™ effectively offers two-form factor or better authentication, and thus become essentially impervious to brute-force attacks. For example, the following are possible:
    • Configure encryptions to expire (or age to a date)
    • Configure to only decrypt for Trusted Associates
    • Embed other conditional criteria for decryption
  • It is also easy to incorporate, currently being available as a DLL or SQL Server assembly, accessible through stored procedures (FRE™ for java and mobile applications coming soon).
  • Empty or small values are encrypted with a padded string that is removed at decryption, in order to hide which fields may be empty, or containing only one or two characters.

Audacious Designs, LLC.
618 Ocean Parkway
Apt. E1
New York, NY 11218-5890
(518) 275-2114

For information, email info@AudaciousDesigns.com