Page 97 - Cyber Defense Magazine RSA Edition for 2021
P. 97

physically located at the location of geolocation defined in the trust criteria to decrypt the message. This
            location may be known to the recipient like a convention, but may also not be known. The trust criterion
            will then be transmitted to him as one of the authentication multi-factors, by SMS / QR Code / Photo or
            any other means.

            If EviToken technology provides security in a secure safe, encryption of messages with trust
            criteria based on environmental components, technical or not, what about the transmission of
            keys for use in a space digital connected?


            To secure end-to-end transmissions, several tools, used as gateways, such as smartphones or virtual
            keyboards, will be crossed. EviToken then builds encrypted channels, from the first communications
            between the EviToken card and the first NFC communication gateway, using an AES 128 symmetric
            pairing  key.  The  latter  will  be  replaced  by  a  256-bit  AES  symmetric  key,  with  different  trust  criteria
            depending on the user's choice, when recording a secret. Communication with web browsers is achieved
            using 256-bit ECC ephemeral keys (X25519), to negotiate exchanges between the smartphone and the
            browser plugin, to insert website authentication, text decryption, etc. As for the transmission, from the
            smartphone, of texts, images or encrypted files, the encryption is carried out with a symmetric key AES
            256 bits with trust criteria.


            Why choose the EviToken technology?

            Our goal is to better understand the feasibility of digital malicious acts through a human approach to
            attacks. Thus, if you do not physically have the EviToken card, or if you do not have access to it with a
            connection duration long enough to carry out an attack, it will be very difficult to compromise the safe,
            but it is quite obvious that «to the impossible no one is bound ". "However, this attack requires physical
            contact, it is no longer possible to hide behind anonymizers. Assuming that the encrypted message is
            sufficiently protected, with algorithms such as 2048 or 4096 bit RSA or even ECDSA, then it is necessary
            to look into the protection of the key. Indeed, this protection will remain true as long as the encryption
            and decryption keys remain secret. History of computer attacks shows certain difficulties in maintaining
            this  assertion.  It  is  therefore  necessary  to  strengthen  the  protection  of  the  keys,  by  accepting  the
            compromise of the latter, while protecting the message during its transport. at best for this requirement,
            non-digital trust criteria, that is to say criteria known, held, observable or understandable by the recipient,
            are required for the decryption of the message and no longer of the key.

            EviToken technology, by adding these trust criteria, changes the current paradigm of access to secrets.
            Thus, even if a secret, and more particularly a decryption key, were stolen, it could only be used if the
            trust criteria are met.


            Based on the EviToken principle, the new EviCypher technology, which won the 2021 gold medal for
            international inventions from Geneva, brings new innovations in the creation, management, integration
            and  augmented  intelligence  linked  to  the  use  of  trust  criteria.  A  new  chapter  on  this  internationally
            patented invention on segmented key authentication is opening.









                                                                                                              97
   92   93   94   95   96   97   98   99   100   101   102