OVERVIEW OF INNOVATION IN DIGITAL SECURITY
|
Since 2020, Carrousel Digital has been committed to digital security by providing solutions to security flaws that are still overlooked. Carrousel Digital has therefore developed various processes to improve cybersecurity: these processes have been patented, testifying their novelty.
|
|
|
Can you please describe these technics?
|
They each address a different problem and implement different technologies, sometimes very innovative, sometimes more traditional:
|
| • | | The post-quantum vulnerability in electronic signatures is addressed by an electronic signature using one-time keys and no encryption mechanism. |
| • | | The distribution of single-use keys for peer-to-peer use within a community is addressed by the so-called single-use key distribution patent, allowing network less operations when necessary. |
| • | | the chaining of transactions carried out in offline mode making it possible to trace the history of financial transactions carried out in offline mode and thus allowing them to be checked a posteriori. |
| • | | The security of encryption keys is addressed by a patent relating to an electronic circuit that 'automatically' erases a memory space (containing encryption keys) when the data in another memory space (containing the code of a software) is modified, rendering unusable hardware whose firmware would have been fraudulently uncovered |
| • | | a mechanism for obfuscating a screen, as soon as a spy camera or a second person approaches the screen field of vision is detected, makes it possible to secure the use of PIN codes. |
| • | | A mechanism for transmitting information by entangled photons makes it possible to communicate in post-quantum security by optical fibres or by satellite. |
| • | | an optical router allowing the use of a photonic network for workstations, where a simple fibre connection of said stations to a single optical router suffices. |
| • | | a geolocation system using electromagnetic waves in the range of UHF to longwave, making it possible to geolocate the counterparty of an online transaction or a user, even when indoors. |
|
Can you provide more details on the photon communication?
|
Digital signatures are used to provide the authenticity of a document, i.e. for verifying that a document has not been altered in transit from its sender. Electronic signatures typical use digests of the document that are then encrypted. However, Quantum computers are making these encryption functions vulnerable, for instance by recomputing the secret keys they use.
|
|
|
Random Hash signature from Carrousel Digital enables quantum safe signing for very simple devices and existing computers; this signature is using secrets and, for encryption, one-time-keys that by essence cannot be decrypted, even by quantum computers.
The scheme can be used in many instances such as emails, or computer to computer communication.
|
The signature requires banks of One-time keys which are short random numbers, as it needs to use a new key for every different message; However, this is not an issue as this key can be relatively short and flash memory is abundant and cheap. For instance, 1Gb of flash memory can store 250 million 32-bit keys, bringing the chance of a fake document not be detected as such to 1 in 4 billion.
|
|
|
The processing required for the signature is also very simple requiring mostly hash functions, which are nowadays programmed in most chips, and in fact are already used for classical signatures.
carrouseldigital.com/quantum-safe-hash
|
|
|
This newsletter was distributed by Health Business published by Public Sector Information Ltd
We are processing your data under legitimate interest. For more information visit the ICO guidance. Your data may be provided to customers to enhance engagement between buyers and suppliers in a B2G and B2B context.
To see our GDPR statement please click here. To unsubscribe click here
|
|