D-Sig develops software to protect sensitive industrial data from unauthorised disclosure and modification.
Extends data security solution within and beyond 5G
Restricts access based upon specific roles
Runs trusted software algorithms
Implements strong cryptography within hardware
D-Sig Certification Authority provides a ‘Root of Trust‘
Protects data against unauthorised access and modification
The cornerstones of D-Sig’s security solution are the use of strong cryptographic algorithms and cryptographic hardware devices.
.
D-Sig protects sensitive data using 'post quantum' cryptographic algorithms (PQC).
These are specified by the National Institute for Science and Technology (NIST) .
.
Cryptographic hardware devices are used for the secure storage of private/secret key information and the implementation of cryptographic algorithms.
.
Strong encryption algorithms protect the confidentiality of data, whereas digital signatures protect the authenticity and integrity of the data.