Cryptographically Addressing Cybersecurity Gaps

Who We Are:     is a software development company based in Irvine, California.  Our experts engineer and develop high-performance, cost-effective cybersecurity technologies to protect organizations from present and emerging threats.

Our Mission: To provide award-winning, cryptanalyst-celebrated solutions including post-quantum cryptography, authentication and identity management systems.

What We Do: Offer advanced data protection, no-friction encryption, authentication, enterprise confidentiality solutions and proximity-based monitoring and intelligence capabilities.

Cryptographically Addressing Cybersecurity Gaps

Who We Are:     is a software development company based in Irvine, California.  Our experts engineer and develop high-performance, cost-effective cybersecurity technologies to protect organizations from present and emerging threats.

Our Mission: To provide award-winning, cryptanalyst-celebrated solutions including post-quantum cryptography, authentication and identity management systems.

What We Do: Offer advanced data protection, no-friction encryption, authentication, enterprise confidentiality solutions and proximity-based monitoring and intelligence capabilities.

 

Five Ways Secure Channels Addresses Cybersecurity Gaps

1. Unique, patented protection technologies for deployments routine and complex
2. Future-ready, compliant solutions resistant to emerging threats
3. Agnostic solutions for any industry
4. Affordable upgrades within outdated cybersecurity infrastructure
5. Industry-applauded, cryptanalyst-lauded innovations

Data Security Innovator, Secure Channels, Chooses Thales to Provide Key Management and Software Licensing Platform For IoT Security Solution

 

Thales has announced its encryption key management and software licencing platforms have been chosen by Secure Channels to protect its quantum-resilient encryption keys for its IoT-enabled devices. By using Thales’ key management platform, both companies’ customers will benefit from increased data protection no matter the connected device, even if there is no current security protection in place. In addition, Thales’ software licensing platform will enable easy access to Secure Channels’ cybersecurity software technology for customers and manufacturers, thus ensuring all IoT devices can be protected easily either at source or retrospectively.

Thales’s enterprise key management platform provides secure storage for the larger-than-average encryption keys required for long-term data protection. Secure Channels’ XOTIC strong cryptosystem ranges in encryption strengths from 512-bit to more than 8,000-bit protection. XOTIC’s “bottom floor” is twice as strong as the prevalent 256-bit encryption that will have questionable efficacy against post-quantum attacks. The combined key management and evolved-encryption solution gives customers highly secure, archive-level data protection across each IoT-enabled device they develop and own.

To view the complete article, click here

Encrypted Video Streaming

Whether you are streaming video, audio or both, XOTIC® can deliver a secure means to watch and archive the video while removing the concern of malicious parties accessing your feeds. Unlike other ciphers, implemented strictly for the long-term storage of media or used within TLS/SSL protocols that maintain a single secret key, XOTIC is constantly changing to protect your data. Implemented on the device itself, the XOTIC cipher re-keys data in transit with random quantum resilient key lengths ranging from 512-bit to 4,096-bits at set time intervals using Secure Channels’ patent pending Wave Form Encryption™ (WFE). Rest easy with your information stored on-premise or in the cloud with a flexible key exchange network that can shard and distribute the keys for the live feed on internationally distributed repeaters, mitigating the risk of any single point of failure in the security of your information. Protect your information today with a cipher that’s strong enough for post-quantum archival of data, but efficient enough to encrypt every frame of your media.

 

ZIPcrypt Review: A Revolutionary Encryption Tool

There is no doubt that ZIPcrypt is a winner in the current encryption software market. It is a novel product that can help organizations protect the confidentiality of their sensitive data. It is particularly useful for companies that deal with a heavy volume of data transfer through emails at different locations as stakeholders can utilize ZIPcrypt for complete privacy.

A fast and user-friendly application, ZIPcrypt works smoothly through SCIFCOM.com. One of the best aspects of SCIFCOM is that it allows the transfer of encrypted files as large as 300 MB – this means that you don’t have to worry about sending huge chunky data files safely anymore.

To read more, click here

 

Entropy Omission Leaves IoT Customers Vulnerable

Secure Channels Solution Delivers Security and Flexibility Essential to IoT

 

A recent report by cybersecurity firm Keyfactor revealed a significant weakness prevalent among IoT devices.  The group found that RSA cryptosystem keys protecting connected devices are generated with a staggering lack of entropy — the randomness that reduces an adversary’s ability to break the encryption.  Inherent design constraints in IoT technology hamper the effectiveness of classical cryptosystems like RSA.  Secure Channels Inc. has prepared a lightweight, stronger cryptosystem IoT manufacturers can better integrate into their products without sacrificing performance: XOTIC Core.

Keyfactor used modest resources to analyze 75 million RSA certificates acquired from the open Internet.  The group found a worrying level of repetition that could facilitate an adversary’s attack on targeted IoT devices.  The report is even more troubling considering the projected growth of IoT from the 23 billion connected devices deployed in 2018 to a forecast 76 billion by 2025.  Convenience, efficiency and misplaced trust in the devices have propelled their deployment to environments with higher stakes, despite the technology’s feeble security.  As noted by Keyfactor’s JD Kilgallin, “These devices are also now seen in increasingly sensitive settings, such as in operating rooms and automobiles. Consumers are also transmitting increasingly sensitive information over the Internet, including financial and personal-health data.”

To view the complete article, click here

Peer Reviews

Dr. Stanislaw Jarecki

Professor, School of Information and Computer Sciences, University of California at Irvine
“SKI offers strong security property vs. standard PKI-based and Kerberos-based secure key communication…”

Dr. Yevgeniy Dodis

Professor of Computer Science University of California, Santa Barbara
“PKMS2® provides an excellent way of protecting information against very powerful attacks.”

Dr. Stefano Tessaro

Assistant Professor of Computer Science University of California, Santa Barbara
“(I am) not aware of any other schemes (theoretical or practical) that achieve similar guarantees with…”

Dr. Matthew Green

Assistant Professor of Computer Science The Johns Hopkins University
“A number of results in the field of cryptography deal with the problem of double (or multiple) encipherment…”

Dr. Stanislaw Jarecki

Professor, School of Information and Computer Sciences, University of California at Irvine
“SKI offers strong security property vs. standard PKI-based and Kerberos-based secure key communication…”

Dr. Yevgeniy Dodis

Professor of Computer Science University of California, Santa Barbara
“PKMS2® provides an excellent way of protecting information against very powerful attacks.”

Dr. Stefano Tessaro

Assistant Professor of Computer Science University of California, Santa Barbara
“(I am) not aware of any other schemes (theoretical or practical) that achieve similar guarantees with…”

Dr. Matthew Green

Assistant Professor of Computer Science The Johns Hopkins University
“A number of results in the field of cryptography deal with the problem of double (or multiple) encipherment…”

Awards

Click award to review the technology.

Next Gen Encryption

Most Innovative Priviledge Account Security

Most Innovative Email Security and Management

Editor’s Choice Encryption

Winner – PKSM

Winner – SUBROSA©

Winner – xSOC

Cutting Edge Encryption

* ALL SCI products and solutions are backed by a $10 million cybersecurity insurance policy.