Page 95 - Cyber Defense Magazine RSA Edition for 2021
P. 95
Evitoken Technology A New Way to
Keep Secrets and Pass Them On
By Fabrice Crasnier, director of Research & Development department of
FREEMINDTRONIC
Controlling the confidentiality of information is now an absolute necessity, as there are so many cyber
malicious acts. We can cite among others acts such as phishing, stalking or ransomware. These so-
called "cyber" threats alone represent approximately 75% of the infiltration techniques giving access to
your confidential or personal data. All of these techniques have the same approach, which is identity
theft. This mechanism allows an individual, or a machine, to impersonate someone or something else.
The recipient thus deceived, lifts his natural mistrust to trust this ill-intentioned sender.
Protection techniques for transmitting confidential or personal data have been around for a very long
time, as have signature mechanisms. They are most often based on asymmetric key algorithms, with
strong encryption (RSA of 2048 or 4096 bits or even ECDSA). Unfortunately, if the model on which these
encryption techniques are based is proven and ensures flawless security, its IT implementation is, for its
95