Jam-resistant secure communications waveform that uses no keys introduced by Digital Matrix Solutions

March 23, 2023
CloakCom uses a specialized, stochastic, and keyless algorithm designed to remove waveform features without degrading the bandwidth.

HERNDON, Va. – Data Matrix Solutions Inc. (DMS) in Herndon, Va., is introducing the CloakCom keyless and featureless, secure communications software waveform for aerospace and defense applications that require resistance to jamming.

CloakCom uses a specialized, stochastic, and keyless algorithm designed to remove waveform features without degrading the bandwidth (i.e. no transmission overhead).

This featureless waveform is called a “metaform” since it has no repetitive elements and frequency is agnostic. This metaform also can help reduce or eliminate the need for spectrum management.

Related: Boeing demonstrates ground-based anti-jam SATCOM technology

CloakCom is NOT a spread-spectrum communications technology. Instead, the jam-resistant secure communications technology uses algorithms that are built on probability mass functions (PMF) that are discrete random variables without repeatable elements.

The whole signal never can be rebuilt by hackers even from many parts. DMS CloakCom uses several layers of discrete random variables to ensure the metaform output is nearly identical to background noise.

Current technologies like direct sequence spread spectrum (DSSS) use transforms like multipliers to attempt to obscure the signal. They are based on probability density functions (PDF) that are differentiable smooth curves with repeatable elements. These features make it possible for hackers to rebuild the whole signal from a few parts of an acquired signal.

Related: ThinKom completes over-the-air tests with K/Q-band phased-array multi-beam antenna on protected comms satellite

The DMS CloakCom metaform algorithm requires no security keys. Nothing is exchanged, shared, or stored between communicants. It eliminates the need for clocks.

CloakCom is platform independent; can use COTS equipment with no loss of feature integrity; is frequency-, data rate-, and transmission-medium agnostic; can be retrofitted to existing equipment; secures the RF carrier itself as opposed to the information it carries.

For more information contact DMS online at www.dmsva.com.

Voice your opinion!

To join the conversation, and become an exclusive member of Military Aerospace, create an account today!