Page 97 - Cyber Defense Magazine RSA Edition for 2021
P. 97
physically located at the location of geolocation defined in the trust criteria to decrypt the message. This
location may be known to the recipient like a convention, but may also not be known. The trust criterion
will then be transmitted to him as one of the authentication multi-factors, by SMS / QR Code / Photo or
any other means.
If EviToken technology provides security in a secure safe, encryption of messages with trust
criteria based on environmental components, technical or not, what about the transmission of
keys for use in a space digital connected?
To secure end-to-end transmissions, several tools, used as gateways, such as smartphones or virtual
keyboards, will be crossed. EviToken then builds encrypted channels, from the first communications
between the EviToken card and the first NFC communication gateway, using an AES 128 symmetric
pairing key. The latter will be replaced by a 256-bit AES symmetric key, with different trust criteria
depending on the user's choice, when recording a secret. Communication with web browsers is achieved
using 256-bit ECC ephemeral keys (X25519), to negotiate exchanges between the smartphone and the
browser plugin, to insert website authentication, text decryption, etc. As for the transmission, from the
smartphone, of texts, images or encrypted files, the encryption is carried out with a symmetric key AES
256 bits with trust criteria.
Why choose the EviToken technology?
Our goal is to better understand the feasibility of digital malicious acts through a human approach to
attacks. Thus, if you do not physically have the EviToken card, or if you do not have access to it with a
connection duration long enough to carry out an attack, it will be very difficult to compromise the safe,
but it is quite obvious that «to the impossible no one is bound ". "However, this attack requires physical
contact, it is no longer possible to hide behind anonymizers. Assuming that the encrypted message is
sufficiently protected, with algorithms such as 2048 or 4096 bit RSA or even ECDSA, then it is necessary
to look into the protection of the key. Indeed, this protection will remain true as long as the encryption
and decryption keys remain secret. History of computer attacks shows certain difficulties in maintaining
this assertion. It is therefore necessary to strengthen the protection of the keys, by accepting the
compromise of the latter, while protecting the message during its transport. at best for this requirement,
non-digital trust criteria, that is to say criteria known, held, observable or understandable by the recipient,
are required for the decryption of the message and no longer of the key.
EviToken technology, by adding these trust criteria, changes the current paradigm of access to secrets.
Thus, even if a secret, and more particularly a decryption key, were stolen, it could only be used if the
trust criteria are met.
Based on the EviToken principle, the new EviCypher technology, which won the 2021 gold medal for
international inventions from Geneva, brings new innovations in the creation, management, integration
and augmented intelligence linked to the use of trust criteria. A new chapter on this internationally
patented invention on segmented key authentication is opening.
97