top of page


Applications normally process unencrypted data. Any data obfuscations would need to be removed for applications to search, do mathematical calculations, or otherwise analyze information. Indeed, classical encryption techniques also do not permit analysis over encrypted data.


Still, requiring plaintext data for analysis creates its own dilemmas. Malicious employees, viruses, zero-day attacks, etc. can all view or steal the unprotected information. A number of today's breaches were successful because data was in plaintext. Also, if the data is encrypted, for example on disk, it may need to be decrypted and re-encrypted after one or more transactions--to maintain its encrypted state. But decryption and re-encryption add latency to processing since they take computer cycles. And if done multiple times (per day, etc.--depending on application architecture), the cumulative latency might be felt by time-sensitive applications.

OptimalCipher has invented a groundbreaking set of encryption methodologies that permit analysis of encrypted data without decryption. These methods:

  • Fully encrypt data, yet allow applications to search, sort, and perform extended data analysis--including mathematics and statistics over encrypted numbers.

  • Frequently require no code changes to, and have minimal performance impact on the underlying applications.

  • Can simultaneously aggregate and enrich information from numerous data sources--e.g., emails, databases, IoT devices, etc.--to improve decision-making in a privacy-protective manner.

  • Can provide a lower Total Cost of Ownership, as within an organization, a single administrative console can be used to control multiple encryption domains--instead of using unalike point encryption solutions.

  • Protects the data--not the systems that the data lives on. So no matter where the data travels to, it remains secure. Only authorized users with the relevant decryption key can decrypt the data. 

Currently, OptimalCipher's encryption supports the following capabilities:

Data Types

  • Unstructured data (including text files/attachments), in any international written language.



  • Cross-platform, end-to-end encryption, with customer-controlled keys.

  • Search capability and data access based on granular policy or user role.

  • Data retention policy enforcement.


  • Dropbox

  • Outlook for the Web 

  • Gmail

  • Slack

  • Microsoft Azure

Other data types, analytical capabilities, and supported platforms are coming in the near future.

bottom of page