Security by design is not an abstract concept.
Advanced cryptography can do much more for security applications than just using AES, RSA and ECC. We are experts at conceiving customized cryptographic primitives and protocols, especially but not exclusively for embedded systems:
You have a concrete use-case for which standard cryptography does not seem good enough? You are after innovative security solutions but lack expertise in cryptographic design? Ask us to conceive a customized security solution best suited to your requirements.
Whenever possible, our security solutions come with appropriate cryptographic security proofs that can serve as a basis for security certification schemes (Common Criteria, FIPS, BSI, ANSSI, etc.) and submissions to standardization organizations (ISO/IEC, CEN, ETSI, etc).
You need to demonstrate the concept? Have us develop a prototype on any embedded or non-embedded computer architecture of your choice.
If you know what you are after, we will invent it for you.
More on Security Proving. Security proofs are certainly among the most remarkable achievements of modern cryptography. They provide a strong form of evidence that an application does reach the required security strength (80 bits, 128 bits, 256 bits, etc.). Now widely adopted by certification bodies and standardization organizations, security proofs may also serve just as an eye-opener for security architects. We are experts at providing security proofs for cryptographic primitives and protocols. Benefit from our expertise to ensure built-in security in your applications.
Smart Card Prototypes. Innovative cryptographic technologies always require validation through a proof of concept. Ask us to deliver a full-featured smart card implementation.
When it comes to embedded implementations of cryptography, smartcards provide the ultimate choice of a computing platform. Precisely because of their limitations in terms of speed, memory space and computing power, succeeding in porting a cryptographic technology on a smartcard guarantees the extreme portability and versatility of a security solution. Even though developing on a smartcard chip at the assembly level may be challenging, some embedded crypto-processors are more powerful and flexible than one may think, and can lead to efficient implementations. A typical example is bilinear maps, an algebraic operation involving points of a pairing-friendly elliptic curve. Depending on the hardware architecture and the characteristics of the crypto-processor involved (if any), arithmetic tricks and appropriate software engineering at the assembly level may provide remarkable performances. Pairing-supporting smartcards can then open the way to powerful privacy-preserving cryptographic primitives such as public-key encryption with keyword search, anonymous credentials or group signatures.
If you would like to see a new cryptographic scheme running in a smartcard, or just need to conduct a feasibility study, ask the right experts. Ask us.