9 Downloadable software to encrypt and authenticate digital files in a distributed networks and zero trust environment; downloadable computer software for encryption and authentication; downloadable computer software for protecting data in the nature of data encryption, key generation, and identity management; downloadable software for ensuring the security of data in the nature of data encryption; downloadable computer software for use in the encryption and decryption of digital files, key generation, and data encapsulation; downloadable computer software for authentication of data providence; downloadable computer software for encryption key management and entropy; downloadable computer software for use protecting centralized data and multi point access control; downloadable computer software for use in the safeguarding of digital files, identities while providing a key recovery systems; downloadable computer software for use key exchange to protect digital files; downloadable computer software for use key exchange to protect digital files; downloadable computer software for non-alterability of digital files; downloadable computer software that uses partially homomorphic protocols to view abstract and underlining data file while remaining encrypted in the cloud; downloadable computer software that uses a templateless biometric for multifactor authentication; downloadable computer software for use in the safeguarding of digital files; security token hardware; USB computer security key; circuit boards; electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication and a key recovery system; encoded electronic chip cards for authentication and a key recovery system; computer circuit boards for authentication and a key recovery system; downloadable computer software that uses a True Random Number Generator (TRNG) to enhance entropy and generate encryption keys; security token hardware; USB computer security key; circuit boards; electronic security token in the nature of a fob-like device used by an authorized user of a computer system that uses a True Random Number Generator (TRNG) to enhance entropy and generate encryption keys to facilitate authentication and a key recovery system