Generation and Sharing of Encryption Keys

The most important discovery of Cynorix concerns generating and sharing truly random, long encryption keys without disclosing any information about the key content. To encrypt data, or have a secure connection of any form, for example a truly secure chat, one needs to share an encryption key between two or more parties. Ideally, the key should be long and truly random. The important question is how to communicate such keys between legitimate users without disclosing any information. Current techniques, typically based on using public/private keys, have many shortcomings, including the fact that in using public/private keys, the information sent about the key over the network can potentially fall in the wrong hands, or even worse, large databases containing millions of keys can be hacked. For example, GEMALTO, the primary maker of mobile phone SIM cards was the target of attacks in which hackers gained access to a huge database of the cryptographic keys used with SIM cards. In addition, the security of public/private keys is based on the difficulty of solving some mathematical problem, which is, in essence, solvable using a very powerful computer. Cynorix team has developed several techniques, based on information theoretical principles, to generate two identical keys at the two points that need to share a key, without disclosing any information about the key (zero information leakage). In addition, our technology allows the keys to be frequently changed, in one extreme, the key is replaced after each use. In other words, the keys are used only once (one-time PAD) and never stored in any form. Our technology also allows to generate keys of a very long lengths. We have selected some of the most powerful encryption techniques designed by the larger scientific community over many years, and have equipped them with the one-time PAD keys generated using our technology. The combination is used to add a layer of encryption to the existing security mechanisms used as industry standard in each particular application. For example, secure transmission over the Internet relies on a technology known as Transport Layer Security (TLS). Our encryption is added as an additional layer without affecting the encryption layer offered by the TLS, and as a result, our technology maintains full compatibility with existing standards. It just adds a second lock with much higher safety to what is at your disposal when you surf web, connect to WiFi, use your IOT devices.

Another benefit for large enterprises and their network administrators: Cynorix key generation technology reduces maintenance costs by removing the need for Public/Private keys (PKI). Note that private keys are prone to being compromised, which, if undetected, will have serious security implications. On the other hand, in case of detecting a private key is compromised, it necessitates generating a new public/private key, and transmitting the new private key to its owner. This is a risky/complex operation as the private key responsible for securing the channel to the corresponding user cannot be utilized any longer (to secure the transmission of the new private key), and as a result, the new private key may be hijacked on the way. Another challenge concerns updating the public key associated with the compromised private key. This necessitates the complex operation of key revocation. Note that the public key of each person has been widely distributed among individuals who intend to use PKI to establish an encrypted channel with that person. Due to its sheer number, replacing copies of compromised public key is a complex and time consuming process. Cynorix technology overcomes all these shortcomings. In our various products, Cynorix key generation is typically combined with existing PKI, resulting in overprotection. In all such products, our key generation can function standalone, solving problems associated with key revocation, or providing security if a private key is compromised without being detected.