Page 95 - Cyber Defense Magazine RSA Edition for 2021
P. 95

Evitoken Technology A New Way to




             Keep Secrets and Pass Them On




             By Fabrice Crasnier, director of Research & Development department of

             FREEMINDTRONIC







































            Controlling the confidentiality of information is now an absolute necessity, as there are so many cyber
            malicious acts. We can cite among others acts such as phishing, stalking or ransomware. These so-
            called "cyber" threats alone represent approximately 75% of the infiltration techniques giving access to
            your confidential or personal data. All of these techniques have the same approach, which is identity
            theft. This mechanism allows an individual, or a machine, to impersonate someone or something else.
            The recipient thus deceived, lifts his natural mistrust to trust this ill-intentioned sender.


            Protection techniques for transmitting confidential or personal data have been around for a very long
            time, as have signature mechanisms. They are most often based on asymmetric key algorithms, with
            strong encryption (RSA of 2048 or 4096 bits or even ECDSA). Unfortunately, if the model on which these
            encryption techniques are based is proven and ensures flawless security, its IT implementation is, for its






                                                                                                              95
   90   91   92   93   94   95   96   97   98   99   100