Security Passcode

Allows access to the keyboard in encryption mode, preventing unauthorized viewing of contacts or encrypted messages. The Security Passcode can be replaced by creating a TouchID/Finger for easier access and increased security. Example: 7201

Decryption Passcode

The sender can assign a 3-number 6-digit Decryption Passcode to one or all messages sent to a specific contact. The receiver must be aware of the code and input the number code to allow decryption and viewing of encrypted messages. Example: 132009


The system-generated user identification that replaces the users provided Profile name when messages are sent. The UserID is used by the application to ensure the user’s name, device phone number or email address collected during registration are never shown during the creation or sending of an encrypted message.

Device Passcode/PIN.

A string of numbers to identify a user and allow access to the device.


A UDID, or “Unique Device Identifier,” is a specific serial number that each iOS (Apple Device) mobile device has been assigned during manufacturing. The UDID mainly serves as a way to document the existence of your device and to track it. It is a 40-number, alphanumeric string that is not replicated on any other iDevice.


Advanced Encryption Standard is a standardized algorithm used to encrypt data. AES is often referred to as a 256-bit, military grade encryption because it has been adopted by the military as the current standard of data encryption. AES has been adopted by the U.S. government and is now used worldwide. It supersedes the Data Encryption Standard (DES),which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.

Public Key Exchange

The Enkryptonite application encrypts data using the AES encryption algorithm and both an encryption and decryption key. When employing the AES encryption standard, the key remains the same for the encryption and decryption. Neither the Enkryptonite company servers nor end users are made aware of the keys. The encryption keyboard loaded on the end users device applies the encryption key.

End-to-end encryption

Enkryptonite messages are encrypted using the AES block cipher by applying a randomly generated encryption/decryption key. The user is never made aware of this message key and therefore is not required to provide the key at any time. The encryption/decryption key is sent along with the encrypted message to the receiver of the message using the standard Diffie–Hellman algorithm. The Enkryptonite keyboard then retrieves the embedded encryption/decryption Key with the same algorithm in order to decrypt the message.