Israeli startup promises unbreakable encryption for the Internet of Things
Even the most advanced cryptography can theoretically be cracked with enough time and processing power, but that’s the least of an organization’s network protection worries. A much more tangible concern is the fact that conventional security protocols suffer from certain design flaws that hackers are potentially able to exploit in order to simply bypass their encryption, a weakness that Secret Double Octopus Ltd. promises to remove with a new approach described as unbreakable both in theory and practice.
The Israeli startup emerged from stealth this morning to reveal a service that applies the so-called “secret sharing” scheme commonly used in the protection of cryptographic keys directly to the data such keys are ordinarily used to scramble. The software works by splitting up a given file into small chunks that are randomized and transmitted to the desired destination through different routes, where the recipient has to perfectly reassemble the payload in order to view the information inside. The arrangement makes interception effectively impossible.
To access a sensitive document protected by Secret Double Octopus, a hacker would need to identify the network paths through which the individual data shards travel, compromise each one and then put everything together. The number of variables that have to be taken into account before pulling that off in a real-life situation is so staggeringly large that the startup’s software is able to match the level of protection afforded by conventional cryptography, except without most of the downsides.
Secret Double Octopus doesn’t make use of keys that can be potentially stolen to unlock the scrambled data, nor does it have to rely on network security protocols to transmit shards over the web. That means the software isn’t susceptible to exploits such as the Poodle vulnerability that was discovered in the open-source OpenSSH standard last year. In fact, the startup says that information under its protection can even be transmitted over unsafe connections since whoever happens to be listening in will never have all the pieces of a file.
Where the technology could prove most useful is securing the growing number of connected devices that organizations are deploying to collect information about their field operations, which often has to travel hundreds of miles before reaching the closest data center. Secret Double Octopus is also targeting mobile workers who likewise often access the corporate network from remote locations, as well as the regular internal traffic that flows among the different branches of a global enterprise. It’s claiming that several unnamed “renowned companies” have already taken an interest in adopting the technology.
Image via JavadR
Since you’re here …
… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.