Cryptography and Key Management

As leading consultants in the application of cryptography, our aim is to share with you an insight into how and why cryptography should be used in today’s modern world of keeping digital data safe.

Modern cryptography today works to keep digital information immune and secure from unauthorised discovery and manipulation by applying mathematical techniques (algorithms) to the target data.

Encryption of data is a critical step in assuring privacy and security.

Looking at the recent horror stories of cyber-crime tells us that these cryptographic processes have not been applied correctly if at all, hence making the data vulnerable to hackers.

Once encryption is applied with an algorithm correctly it is practically very difficult and uneconomic for an attack to be successful.

How Encryption and Decryption is processed

Encryption

Encryption

Algorithm is applied to the plaintext input to create ciphertext

Decryption

Decryption

Reverse the process to get plaintext from ciphertext

By applying encryption this empowers the service of confidentiality. By converting your plain text to cipher text you can be assured that your private information is kept confidential and safe.

In 1893, the celebrated Dutch cryptographer Auguste Kerchoffs first provided the fundamental principle of cryptography. He stated that security should not be dependent on knowing the mathematical process of encryption, the algorithm, but only on keeping the secret key which drives the algorithm secret.

Following Kerchoffs principles, organisations providing these confidentiality services should ensure the safety of the secret key. In other words, unless you know the key you can’t break the algorithm.

Achieving Data Integrity

Points to consider

  • E-commerce and e-payments depend on confidentiality and data integrity and payment data is the last thing you need to have modified by a hacker without detection.

  • Basic encryption will not provide protection for data integrity as it does not provide a cryptographic checksum which detects unauthorised changes.

  • When using public key cryptography these checksums are called digital signatures which verify the contents and identity.

  • A digital signature also provides non-repudiation which prevents denial by the sender.

So what do we do?
We advise clients on the use of cryptographic techniques in all forms of digital data protection that includes:
Data privacy
Electronic payments and transactions
Digital currencies and blockchain applications
Internet Of Things (IOT)
Industrial Control Systems (ICS)
So how do we do this?
We use agile development techniques for embedded cryptographic systems in the following hardware devices:
Hardware Security Modules (HSMs)
Secure Elements (SE)
Smart cards and secure MicroSD cards
Cryptographic tokens
Mobile devices

GET IN TOUCH

We will listen to your requirements and advise you on the best way forward.

We design and develop solutions both proof of concept and production to match your needs.

Call +44 (0)1903 723 548 or email us at m.

CONTACT US

+44 (0) 1903 723 548
+44 (0) 1903 734 975



Microexpert Limited
Gratwicke House
10 East Street
Littlehampton
West Sussex
BN17 6AW, UK

© 2018 Microexpert. Registered number 01755695.
line-height: 180%;