D-sig

Securing Industrial Data

D-Sig develops software and hardware to protect industrial data from cyber-attacks.  It does this by the use of strong cryptographic algorithms, such as encryption and digital signatures, and the use of cryptographic hardware devices.

Untitled design (1)

Restricts access based upon specific roles

Untitled design

Runs trusted software algorithms 

2

Protects data against unauthorised access and modification

1

Extends data security solution within and beyond 5G

Extends data security solution within and beyond 5G

Untitled design (1)

Restricts access based upon specific roles

Restricts access based upon specific roles

Untitled design

Runs trusted software algorithms 

Runs trusted software algorithms

3

Implements strong cryptography within hardware

Implements strong cryptography within hardware

Untitled design (1)

D-Sig Certification Authority provides a ‘Root of Trust’

D-Sig Certification Authority provides a Root of Trust

2

Protects data against unauthorised access and modification

Protects data against unauthorised access and modification

The cornerstones of D-Sig’s security solution are the use of strong cryptographic algorithms and cryptographic hardware devices.

Digital Signatures

.

D-Sig takes its name from its use of Digital Signatures to protect the integrity of data.  They are created by combining the data and some unique secret information (known as a private key) stored within a protected, encrypted hardware device. The private key is unique to each user or device and cannot be copied.

The usefulness of Digital Signatures is that they can detect changes to data, as the data and signature will  no longer match. Recipient of this data will be alerted to the fact that the data has been compromised.

Strong Cryptographic Algorithms

.

D-Sig protects data using strong cryptographic algorithms e.g. the NIST Elliptic Curve algorithms for Digital Signature and Encryption Key Agreement.

Originally these were designed to be secure until 2035, but now with the advent of Quantum Computers, they will need to be replaced earlier.  The National Institute for Science and Technology (NIST), in the USA, are working on new, Quantum-Safe algorithms, and D-Sig will move over to using these as soon as they become available.

Cryptographic Co-processors

.

The D-Sig Data Security solution ensures that sensitive data is protected at all times.  As much as possible of the processing takes place within secure cryptographic hardware devices. At all other times data is protected by being digitally signed and encrypted.

Find out more about D-Sig Data Security.