USENCRYPTION HAS A NEW APPROACH • USE REVERSIBLE COMPUTING TO OBFUSCATE A COMBINATION OF BARE FUNCTIONS AND ENCRYPTION/DECRYPTION OPERATORS • REBUILD EVERY FUNCTION ONCE FOR A GIVEN ENCRYPTION KEY, THEN OPERATE AS MANY TIMES AS DESIRED • CAN APPLY TO ANY ENCRYPTION METHOD E.G. BLOCK CIPHERS CONFIDENTIAL 5
USEncryption - Pitch Deck Page 4 Page 6