NEW: Antivirus AI Mac is now availableDiscover now →
English
Deutsch Español Français Italiano Português Русский العربية हिन्दी 日本語 简体中文
For Home
Your privacy.
Uncompromised.
Real-time AI security for Android, iPhone, Mac and Windows. Independently certified and multiple award-winning.
Explore our products
AndroidAndroid
Anti Spy newfree
Detect & block spyware
Antivirus AI newfree
Real-time AI protection
Firewall AI free
Control network access
Camera Guard free
Monitor camera in real time
Micro Guard free
Protect microphone from spying
iShredder newfree
Permanently delete data
iOSiOS
iShredder iOS new
Securely delete photos & files
MacMac
Antivirus AI Mac free
Virus protection for macOS
Camera Guard Mac
Monitor camera in real time
iShredder Mac
Certified file deletion
iShredder iOS
Also runs on Apple Silicon Macs
iLocker Mac
Encrypt & lock apps
WindowsWindows
iShredder Windows
Certified data erasure
iShredder Server
For servers & IT teams
iShredder Technical
23 certified erasure standards
For Business
Security for
your organization.
Certified data erasure and security for SMBs, government agencies and enterprises – fully GDPR-compliant.
Explore business solutions
Android & iOS
iShredder Business b2b
Securely wipe multiple devices
iShredder Enterprise
MDM integration & certificates
Windows Server
iShredder Server b2b
Wipe servers & RAID arrays
iShredder Technical
Bootable, 23 certified erasure standards
For Defense
Defense Solutions
Defense Solutions gov
Trusted by government agencies & defense organizations worldwide
About Us
Shaping Security
since 2004.
We protect the privacy of over 8 million people worldwide – independently, transparently, without unnecessary data collection.
Our story
Company
About Protectstar
Who we are & what drives us
Our Philosophy
Security as a human right
Why Protectstar
Certified & award-winning
Your Privacy
How we protect your data
Environment
Our commitment to the planet
Team & Press
Our Team
The people behind Protectstar
Founder's Message
Vision & mission first-hand
Press Center
Media, logos & press kit
Intelligence
Artificial Intelligence
Artificial Intelligence
On-device AI detecting new threats in real time
iShredding
iShredding
23 certified erasure standards
For Home
For Business
About Us
FAQ & SupportBlog
Protectstar Technology

Not standard.
Better.

We didn't just use AES — we redesigned it. With 512-bit blocks, 24 rounds, and a publicly documented algorithm.

Built for a world where standard is no longer enough.
Source code Documentation (PDF)
Open algorithm
Independently verifiable
At a glance

Four numbers.
One fundamental difference.

What sets Protectstar Extended AES apart from standard AES can be reduced to four key metrics — each with a direct impact on your security.

512
Block size (bits)
4× standard AES
24
Encryption rounds
AES-256: 14 rounds
3
Key lengths
128, 256 & 512 bits
CTR
Default mode
+ CBC, CFB, OFB, ECB
Standard vs. Extended

What we do differently.

Standard AES is excellent. Our Extended AES builds on that foundation — and takes several fundamental steps further.

Standard AES
Block size 128 bits
Matrix 4 × 4
Rounds AES-128 / AES-256 10 / 14
Max. key size 256 bits
Full diffusion after 2 rounds
Protectstar Extended AES Our technology
Block size 512 bits
Matrix 4 × 16
Total rounds 24
Max. key size 512 bits
Full diffusion after 4 rounds *

* Optimized ShiftRow offsets {0,1,4,5} reduce the rounds needed for full diffusion in the 512-bit variant from 5 to 4. Standard AES achieves full diffusion after 2 rounds in its smaller 4×4 matrix.

Standard AES
4 × 4 · 128 Bit
Protectstar Extended AES
4 × 16 · 512 Bit

Each cell is one byte. A larger matrix means more data per encryption block — and significantly more complexity for any attack.

Round architecture

More rounds.
More protection.

Each round refines and obfuscates. The 512-bit matrix demands more passes — and we provide them, because security leaves no room for compromise.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
AES-128: 10 rounds
AES-256: 14 rounds
Protectstar Extended AES: 24 rounds
Why it matters

Security you can
feel.

Technology nobody understands helps nobody. Here's what Extended AES really means.

Future-proof

512-bit keys are designed to withstand future attacks too — including threats that do not even exist yet.

Optimized diffusion

Adjusted ShiftRow offsets {0,1,4,5} reduce the rounds needed for full diffusion in the 512-bit variant from 5 to 4 — a measurable improvement over naive scaling.

Open & verifiable

No security through obscurity. We publish the complete algorithm and source code for independent review and verification.

Technical documentation
Complete algorithm specification
Padding, key expansion, modes of operation, source code reference
1. Motivation
Standard AES uses a 4×4 matrix (128 bits). Extended AES uses a 4×16 matrix (512 bits) and retains AddRoundKey, MixColumn, and S-box substitution unchanged, while specifically extending the ShiftRow offsets, the number of rounds, and the key expansion.
2. Modes of operation
ECB, CBC, CFB, OFB, and CTR are fully implemented. The default mode is CTR.
3. Total number of rounds
Number of rounds = (key size or block size in words) + 6. For a 512-bit block: 16 words → 22 rounds, plus 2 additional rounds due to the extended ShiftRow operation = 24 rounds total.
4. Padding
Message padding follows RFC 1321 to multiples of 512 bits. Key padding: shorter passwords are padded with zeros and then encrypted using standard AES in CBC mode to avoid round keys with many zero bytes.
5. Round key generation
Modified KeyExpansion process (Rijndael Spec, p. 15):
KeyExpansion(byte Key[4*Nk], word W[Nb*(Nr+1)]) { for(i = 0; i < Nk; i++) W[i] = (key[4*i], key[4*i+1], key[4*i+2], key[4*i+3]); for(i = Nk; i < Nb * (Nr + 1); i++) { temp = W[i - 1]; if (i % Nk == 0 || (i % Nk == 4 && Nk > 6)) temp = SubByte(RotByte(temp)) ^ Rcon[i / Nk]; else if ((i % Nk == 8 || i % Nk == 12) && Nk > 6) temp = SubByte(temp); W[i] = W[i - Nk] ^ temp; } }
6. ShiftRow
Standard offsets {0,1,2,3} would not achieve full diffusion in Extended AES until after 5 rounds. Optimized offsets {0,1,4,5} achieve full diffusion after just 4 rounds. Source code: com.crypt.test.OptimumShiftRow.java
References
AES: wikipedia.org/wiki/Advanced_Encryption_Standard · Block Cipher Modes: wikipedia.org/wiki/Block_cipher_modes_of_operation · PKCS #5 v2.1: RSA Laboratories, October 2006