Core Features & Advantages
NKL transforms network security and performance, optimizing encrypted communications for unparalleled speed, security, and scalability.
New Keys Lab (NKL) is transforming network performance
and security with its patented encryption technology that
streamlines the key exchange process, eliminating the need for
compute-intensive asymmetric keys or pre-shared keys (PSKs).
New Keys Lab (NKL) is transforming network performance and security with its patented encryption technology that streamlines the key exchange process, eliminating the need for compute-intensive asymmetric keys or pre-shared keys (PSKs).
Asymmetric Encryption/Decryption
Save asymmetric resources
Asymmetric Encryption/Decryption
Save asymmetric resources
NKL transforms network security and performance, optimizing encrypted communications for unparalleled speed, security, and scalability.
NKL transforms network security and performance, optimizing encrypted communications for unparalleled speed, security, and scalability.
Eliminates Power-Hungry Asymmetric Encryption – Maximizes Hardware Efficiency
Eliminates Power-Hungry Asymmetric Encryption – Maximizes Hardware Efficiency
The rise of IoT devices, AI applications, cloud computing, and emerging computing technologies has created a tremendous demand for high-speed, efficient, and secure networks.
NKL provides a solution that optimizes encryption and enhances network performance, effectively addressing key industry pain points with targeted strategies.
The rise of IoT devices, AI applications, cloud computing, and emerging computing technologies has created a tremendous demand for high-speed, efficient, and secure networks.
NKL provides a solution that optimizes encryption and enhances network performance, effectively addressing key industry pain points with targeted strategies.
Maor Cohen, Co-Founder & CEO.
Trained at the IDF’s prestigious Center for Computing and Information Systems (Mamram), then serving in the central intelligence technology unit. Over 15 years of experience in the high-tech cybersecurity and healthcare industries, including in senior management roles.
Yossi Avni, Co-Founder & CTO.
Professor of Computer Science at the Israel Technion Institute of Technology. Research includes caching, network monitoring, stream processing, reliable distributed systems, high-availability and fault-tolerance, blockchains, cloud computing, wireless ad hoc networks, and middleware.
Prof. Roy Friedman, CSO.
Professor of Computer Science at the Israel Technion Institute of Technology. Research includes caching, network monitoring, stream processing, reliable distributed systems, high-availability and fault-tolerance, blockchains, cloud computing, wireless ad hoc networks, and middleware.
PhD. Gil Pogozelich, Co-Founder & Chairman.
Trained at the IDF’s prestigious Center for Computing and Information Systems (Mamram), then serving in the central intelligence technology unit. Over 15 years of experience in the high-tech cybersecurity and healthcare industries, including in senior management roles.
Professor of Computer Science at the Israel Technion Institute of Technology. Research includes caching, network monitoring, stream processing, reliable distributed systems, high-availability and fault-tolerance, blockchains, cloud computing, wireless ad hoc networks, and middleware.
Professor of Computer Science at the Israel Technion Institute of Technology. Research includes caching, network monitoring, stream processing, reliable distributed systems, high-availability and fault-tolerance, blockchains, cloud computing, wireless ad hoc networks, and middleware.
Highly skilled and experienced in the management of complex development teams in mathematics, algorithms and engineering, with several registered patents. He has initiated and founded a number of leading companies in the fields of signal processing and AI-powered healthcare.
Shiri Dolev, Advisory Board Chairman.
An experienced leader with a strong background in cyber intelligence, mobile, telecom, and semiconductors. She has driven innovation and strategic growth in both public and private sectors, leading projects that deliver impactful solutions and foster industry partnerships.
MG (Ret.) Meir Klifi-Amir, International Government Affairs Advisor.
Served 33 years in the Israel Defense Forces, holding key command roles and acting as Military Secretary to Prime Ministers Olmert and Netanyahu. He is now a senior consultant in national security and strategic planning for governments and global organizations.
Ron Shvili, Strategic Technology Advisor.
An experienced executive in telecommunications and finance, A retired IDF Colonel, where he led research specializing in communications, cyber, and AI. Previously held C-level positions in prominent international technology companies.
Doron Omer, Business Development Advisor.
Expert in all aspects of large-scale IT data integration and comprehensive hardware solutions. Previously founded and led organizations that provided one-stop IT services to large-scale enterprises and institutions.
An experienced leader with a strong background in cyber intelligence, mobile, telecom, and semiconductors. She has driven innovation and strategic growth in both public and private sectors, leading projects that deliver impactful solutions and foster industry partnerships.
Served 33 years in the Israel Defense Forces, holding key command roles and acting as Military Secretary to Prime Ministers Olmert and Netanyahu. He is now a senior consultant in national security and strategic planning for governments and global organizations.
An experienced executive in telecommunications and finance, A retired IDF Colonel, where he led research specializing in communications, cyber, and AI. Previously held C-level positions in prominent international technology companies.
Expert in all aspects of large-scale IT data integration and comprehensive hardware solutions. Previously founded and led organizations that provided one-stop IT services to large-scale enterprises and institutions.
NKL’s solution delivers the same robust security as current encryption methods, with the added benefit of configuration options for even higher security grades as needed.
By significantly reducing power, time, and cost demands, NKL is a game changer for industries reliant on efficient, high-performance encryption – from semiconductor innovators to network security leaders and software applications focused on optimizing computational resources.
NKL’s solution delivers the same robust security as current encryption methods, with the added benefit of configuration options for even higher security grades as needed.
By significantly reducing power, time, and cost demands, NKL is a game changer for industries reliant on efficient, high-performance encryption – from semiconductor innovators to network security leaders and software applications focused on optimizing computational resources.
Setup time: 300ms → 50ms
12 steps → 4 steps
Lower CPU & memory usage