Digital Security by Design – Developing complexity based, un-crackable, high-efficiency mass information and data security products

Lead Participant: CYBERVECTOR LIMITED

Abstract

Is your data in the Cloud? Do you know how well it is protected? You've heard of encryption, and perhaps you use it, but even then only for a fraction of your data. Perhaps you think that the custodians of your data are using some form of bulk security protection. So why are there still data breaches? Social Media posts get sold to news outlets. Bank data is used by criminals to buy stuff you've never requested. Official Secrets are posted on WikiLeaks.

The truth is that data custodians such as Facebook, Amazon Web Services, Azure, Instagram and many others including government departments rarely, if ever, apply some form of high-grade security protection to 100% of the data that they manage. Commonly, less than 10% is protected in that way.

There are a number of reasons for this. Existing products may require careful management of cryptographic keys or security certificates. This is cumbersome and the products are expensive. The methods used by these products are process hungry, so computer CPUs work harder, using more power. The datacentres containing the computers need more cooling, and that's not good for the environment. And that all costs money. Additionally, the data custodians are rarely fined a materially painful sum when a breach occurs. There's too much stacked against high-grade data protection.

Our Security Product protects data completely differently from all other existing methods. We use mathematical complexity to noisily jumble up the data when it needs to be stored securely, and use other concepts of reversibility to un-jumble and remove the noise when the data is used or needed. The process is highly computationally efficient, to the degree that we believe that 100% of the data stored in a datacentre can be protected, whilst lowering the CPU load, reducing power consumption and delivering environmental benefits.

The Security Product works in a manner that means a breach by theft or accident is just a theft of a lot of randomly noisy jumbled up fragments, that can't be un-jumbled and the noise removed without knowing how complexity has been used, and where in all the noise to find that information, or what that information looks like.

So, breaches can be a thing of the past. The custodians of your data can reduce their operating costs, improve the environmental impact of their datacentres and protect 100% of the data, your data, that they manage.

Lead Participant

Project Cost

Grant Offer

CYBERVECTOR LIMITED £352,465 £ 246,726
 

Participant

INNOVATE UK
XPERTEX LTD £12,672 £ 8,870

Publications

10 25 50