Recent news regarding data security has caused broad focus on information privacy and encryption. Individuals and corporations are sitting on the sidelines waiting for others to decide whether or not they have the option to safeguard their own information.
Single-key encryption (AKA symmetric encryption) and public-key encryption (AKA asymmetric encryption) are currently the two most common encryption methods. Single-key is most prevalent because it is considered to be more secure and efficient due to its simpler encryption and implementation processes. Contrary to popular belief, single-key encryption contains disadvantages that have a role in the increasingly high frequency of data breaches.
In a traditional single-key encryption process, one key is used to encrypt and decrypt data. This means that the sender and the receiver must both have one key in order to share data. Sending that single key requires that it be temporarily exposed in memory, which creates a window of opportunity for hackers. Once any party gets hold of the encryption key, they officially have access to the data to which it belongs.
Fortunately, we’ve developed a new encryption method to solve this vulnerability issue. Our technology encrypts the encryption key with a chip-resident “black key,” rendering any single encryption key useless to hackers. The hardware-encrypted “black key” is not only isolated from hacker exposure, but with our “zero knowledge” capabilities, is also isolated from the cloud provider as well, resulting in a fully secured environment.
At the USA RSA Conference, taking place in San Francisco from February 29th to March 4th, influencers and decision makers will be exchanging ideas and innovations to protect this commodity. The topic of key encryption is relevant today more than ever with data protection at the forefront. Individuals and companies across all industries are waking up to the fact that they need to take action to secure their personal and business data which will be fueled by the innovation of new and more secure encryption methods.