'; $('#et-footer-nav').append(ssl_seal); }); });
PKMS2: Super Encipherment Encryption Engine
PKMS2: Super Encipherment Encryption Engine
Contact Us for Effective Security Solutions
PKMS2 :Super Encipherment Encryption Engine
Contact Us for Effective Security Solutions

PKMS2®: Quantum Resilient Encryption

Five Ways PKMS2 Addresses Cybersecurity Gaps

  1. Future-ready cybersecurity behind layers of encryption
  2. Innate fallback security if any ciphers compromised
  3. Resistance to multiple cyberattacks
  4. Assimilation of new quantum-resilient ciphers
  5. Encryption suited for regulated environments

PKMS2® and your Business

  • Patented method for combining encryption algorithms
  • Encryption strength increases to (387-bit to 512-bit)
  • Choice of 2 to 8 trusted algorithms, including (AES)
  • Swappable API replacement for (AES) library
  • Fully compliant for any industry
  • Platform agnostic integration
  • Additional protection benefits:

    -Increased side-channel attack resistance

    -Fall-back security should one algorithm get broken

    -Provides cryptographic agility in being able to incorporate new quantum-resistant algorithms as they becomes available

     

What is PKMS2®?

  • Combines and hardens from 2 to 8 existing, known, symmetric algorithms using an easily deployable mode of operation
  • Starting strength is 387-bit, mitigates against brute force & side channel attacks
  • Can incorporate new (Quantum-resilient) ciphers currently being evaluated as they become available

Filling the Cybersecurity Gap for Database Security

Database encryption has long been viewed as redundant protection only needed in cases where firewalls, identity authentication and all other security measures fail. However, the abundance of general and industry-specific regulations regarding safeguarding sensitive data means encryption may be what spares organizations from heavy fines, lost business and shattered reputations in the event of a breach. The frequency and severity of breaches are soaring, increasing the need for stronger security. Despite this, many organizations resist database encryption technology due to perceived implementation difficulty.

A compromised database has the potential to reveal sensitive personal or proprietary information, harm the confidence in an organization, and leave the impacted business open to severe financial penalties and civil suits. Far-reaching data privacy controls like the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) increase the fines and liabilities for organizations entrusted with safeguarding personal information of covered residents. Industry-specific regulations like in the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Payment Card Industry Data Security Standard (PCI DSS) and the Federal Information Security Modernization Act (FISMA) outline controls for concerned institutions tasked with protecting data, and steps they must take when they fail to do so. The best practice to comply with each, whether explicitly mandated or vaguely suggested, is to deploy strong, future-ready encryption.

Prevalent block cipher modes of operation (e.g., AES) are far more resistant to attacks from advanced computer power that asymmetric cryptosystems providing their key lengths exceed the practical brute force capabilities of an attacker. A database encrypted with AES can risk exposing part or all of the material contained should such an attack successfully uncover an encryption key. Developing technologies create many uncertainties when it comes to the efficacy of today’s ciphers.

PKMS2 solves with:

  • Strength: The PKMS2 mode of operation provides elevated future-ready protection by using multiple symmetric algorithms to form compounded layers of encryption. The resulting key length, starting at 387 bits, is longer that of its constituent ciphers.
  • Integrity: PKMS2’s use of various algorithms in an encryption deployment provides fallback security should one be compromised.
  • Confidentiality: PKMS2’s mode of operation is provably resistant to side-channel, message recovery and brute force attacks.
  • Adaptability: PKMS2 is platform agnostic for universal deployment. It is a swappable API replacement for the AES library.
  • Reinforcement: A database backup encrypted with PKMS2 can help organizations quickly recover from ransomware attacks.
  • Readiness: PKMS2 can incorporate new quantum-resilient algorithms as they become available to outpace advancing computer technology.
  • Compliance: PKMS2 uses FIPS140-2-compliant AES and delivers a level of encryption beyond the “reasonable security” prescribed in most data privacy controls. A compromised organization may find “safe harbor” from damaging breach reporting protocols if leaked data is encrypted with PKMS2.

Encryption Peer Reviews for (Licensed) PKMS2

Dr. Matthew Green

Assistant Professor of Computer Science The Johns Hopkins University
“A number of results in the field of cryptography deal with the problem of double (or multiple) encipherment…”

Dr. Stefano Tessaro

Assistant Professor of Computer Science University of California, Santa Barbara
“(I am) not aware of any other schemes (theoretical or practical) that achieve similar guarantees with…”

Dr. Yevgeniy Dodis

Professor of Computer Science University of California, Santa Barbara
“PKMS2® provides an excellent way of protecting information against very powerful attacks.”

Secure Channels Solutions Using PKMS2® Technology

In The News

25% of companies affected by cloud cryptojacking
Cryptojacking has unquestionably gone mainstream. Despite heavy media and industry attention,...
Suspected State-Sponsored Hackers Pummel US and Australia
Dozens of companies in the U.S. and political parties in Australia have been targeted in...
SUBROSA©
Time to Paradigm Shift Passwords by Richard Blech
Paradigm, a theory or a group of ideas on how something should be done, made, or thought...

Technology in the News

How to Avoid the Top Three Causes of Data Breaches in 2019

What's the price of unprotected IT infrastructure? Cybercrime Magazine says that global damages will surpass $6 billion as soon as 2021. Here we'll go through some of the most frequent and emerging causes of data breaches in 2019 and see how to address them in a...

Google confirms ‘quantum supremacy’ breakthrough

Google has officially announced that it’s achieved quantum supremacy in a new article published in the scientific journal Nature. The announcement comes exactly one month after it initially leaked, when Google’s paper was accidentally published early.Did you enjoy...

NordVPN confirms it was hacked

NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached.Did you enjoy this article? Then read the full version from the author's...

We asked a hacker to try and steal a CNN tech reporter’s data. Here’s what happened

I share, therefore I am. I am the kind of person who posts Instagram photos (filtered, of course) from my vacation. I am also the kind of person who tweets about buying an overly-expensive piece of furniture because I fell for a sleek online ad about how it would...

Newsrooms, let’s talk about G Suite

There are many legitimate reasons to give administrators this far-reaching ability to organize and retain user data, such as compliance with legal requests. All of this logging and retention functionality may also help your organization’s administrators monitor for...

In the last 10 months, 140 local governments, police stations and hospitals have been held hostage by ransomware attacks

The attack starts, innocently enough, with an email. But when someone clicks the link inside, hackers quickly take over. CNN's Tina Burnside, Kevin Collier, Pierre Meihan, Faith Karimi, Eli Watkins and Zachary Cohen contributed to this story. Did you enjoy this...

Cloud Breaches Like Capital One Will Strike At Self-Driving Cars

The news has covered yet another breach of systems security that involves the theft of massive amounts of data, in this case impacting an estimated 100 million customers of Capital One Financial Corp. In the past, the public might have reacted vociferously in outright...

Siemens-Poneman Study: Cyber attacks on power utilities are growing in numbers, complexity

The cybersecurity risks against critical power infrastructure seems to be worsening, as a new study indicates that 56 percent of respondents reported their companies suffered one or more shutdowns or loss of operational data per year. Did you enjoy this article? Then...

Hack Breaks PDF Encryption, Opens Content to Attackers

Researchers in Germany have invented a new hack that can allow someone to break the encryption of PDF files and access their content  — or even forge signed PDF files under certain circumstances. Did you enjoy this article? Then read the full version from the author's...

‘Harvesting Attacks’ & the Quantum Revolution

Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there's a working quantum computer in five to ten years. The time to act is now. The Information Age replaced industrial equipment with data. Did you enjoy this article?...