D-Sig develops software and hardware to protect industrial data from cyber-attacks. It does this by the use of strong cryptographic algorithms, such as encryption and digital signatures, and the use of cryptographic hardware devices.
Extends data security solution within and beyond 5G
Restricts access based upon specific roles
Runs trusted software algorithms
Implements strong cryptography within hardware
D-Sig Certification Authority provides a ‘Root of Trust‘
Protects data against unauthorised access and modification
The cornerstones of D-Sig’s security solution are the use of strong cryptographic algorithms and cryptographic hardware devices.
.
D-Sig takes its name from its use of Digital Signatures to protect the integrity of data. They are created by combining the data and some unique secret information (known as a private key) stored within a protected, encrypted hardware device. The private key is unique to each user or device and cannot be copied.
The usefulness of Digital Signatures is that they can detect changes to data, as the data and signature will no longer match. Recipient of this data will be alerted to the fact that the data has been compromised.
.
D-Sig protects data using strong cryptographic algorithms e.g. the NIST Elliptic Curve algorithms for Digital Signature and Encryption Key Agreement.
Originally these were designed to be secure until 2035, but now with the advent of Quantum Computers, they will need to be replaced earlier. The National Institute for Science and Technology (NIST), in the USA, are working on new, Quantum-Safe algorithms, and D-Sig will move over to using these as soon as they become available.
.
The D-Sig Data Security solution ensures that sensitive data is protected at all times. As much as possible of the processing takes place within secure cryptographic hardware devices. At all other times data is protected by being digitally signed and encrypted.
Find out more about D-Sig Data Security.