Each block contains information from the previous one, so it can only be modified by altering the whole set using
asymmetric cryptography. This system guarantees the security of communication.
Once the virus has infiltrated a computer or server, Dharma encrypts stored files through
asymmetric cryptography, locking the computer's or server's contents.
Asymmetric cryptography delays the delivery of safety messages.
Specialized on-chip security features include the ability to generate and safely store private keys using symmetric and
asymmetric cryptography, a true random number generator (TRNG), and special memory protection functions.
In Scheme 2 which is a G-S symmetric encrypted nonfragmented transmission, after being encrypted in G using a symmetric cryptography, the data is sent to S as a complete packet in the information integration layer, and in Scheme 3 which is a G-S asymmetric encrypted nonfragmented transmission, an
asymmetric cryptography is used.