SECURE YOUR COMMUNICATION

Digital networks, including the “Internet of Things”, are a playground for hackers.

Wireless transmissions can be intercepted by nearby lurkers.  Infrastructure grids, governmental cellphones, industries, military networks, medical data protection are particularly vulnerable because it affects all of us.

 “SmartHome” systems and unmanned vehicles—such as drones and self-driving cars—respond to signals that a knowledgeable hacker can manipulate. Unmanned vehicles such as drones and self-driving cars, can even be misdirected by fake visual signals sent to the vehicle’s sensors.

Using 5G Internet, the Vehicle-to-Infrastructure (V2I) technology wirelessly captures vehicle-generated traffic data, and provides information from the infrastructure to the vehicle that informs the driver of safety, mobility, or environment-related conditions. However, wireless signals from the Infrastructure are classical signals that can be copied by a “man-in-the-middle” and, in principle, replaced by false information including crucial commands.

What stands in the hacker’s way? 

Authenticated Data Encryption guarantees the origin of the information and blocks the hacker’s access the information to replace the original signal. The encryption must be resistant to advances in computation (including quantum processors) and mathematical breakthroughs.

Classical encryption protocols are vulnerable

Classical encryption protocols, e.g. RSA & Elliptical Curve Cryptography and many others,  are based on algorithm protocols and theoretically unproven assumptions: They are vulnerable to attacks – see a review in “Post-quantum cryptography”, D. J. Bernstein & T. Lange, doI:10.1038/nature23461.

Do you want to make encryption invulnerable?

Secure communication adding physical features beyond algorithm protocol strengthens protection. Two options:

Pure quantum technology (QKD) gives maximum protection but is not practical. It’s expensive, require special networks and are slow.

The KeyBITS Platform offers end-to-end perfect secrecy with fast speed and affordable cost, working  in standard networks. The basic protection is given by quantum noise.

The KeyBITS technology is based on patent US 7,831,050 B2 (2010), held by Dr. G. A. Barbosa. 

Messenger, IoT and IIoT applications