D-Sig

Securing Industrial Data

D-Sig develops software to protect sensitive industrial data from unauthorised disclosure and modification.

Untitled design (1)

Restricts access based upon specific roles

Untitled design

Runs trusted software algorithms 

2

Protects data against unauthorised access and modification

1

Extends data security solution within and beyond 5G

Extends data security solution within and beyond 5G

Untitled design (1)

Restricts access based upon specific roles

Restricts access based upon specific roles

Untitled design

Runs trusted software algorithms 

Runs trusted software algorithms

3

Implements strong cryptography within hardware

Implements strong cryptography within hardware

Untitled design (1)

D-Sig Certification Authority provides a ‘Root of Trust’

D-Sig Certification Authority provides a Root of Trust

2

Protects data against unauthorised access and modification

Protects data against unauthorised access and modification

The cornerstones of D-Sig’s security solution are the use of strong cryptographic algorithms and cryptographic hardware devices.

Strong Cryptographic Algorithms

.

D-Sig protects sensitive data using 'post quantum' cryptographic algorithms (PQC).

These are specified by the National Institute for Science and Technology (NIST) .

Cryptographic Hardware Devices

.

Cryptographic hardware devices are used for the secure storage of private/secret key information and the implementation of cryptographic algorithms.

Digital Signatures and Encryption

.

Strong encryption algorithms protect the confidentiality of data, whereas digital signatures protect the authenticity and integrity of the data.