Virtual Private Network
Virtual Private Networks (VPNs) have wide-spread application in communication over the Internet. A first shortcoming of existing VPN tools is their reliance on legacy key sharing techniques. Most VPNs can accept encryption keys as inputs (such keys can be generated by any key sharing algorithm of choice). This means most existing VPN tools can be easily and seamlessly integrated with one of Cynorix quantum-safe key sharing algorithms. The encryption key generated by Cynorix techniques can be also used to add a second layer of encryption to existing VPNs, maintaining compatibility with existing deployments. In addition, Cynorix encryption keys can be renewed as often as desired without disclosing any information about the key bits.
A second shortcoming of existing VPN tools is that they rely on a simple login-name and password for authentication. This has forced enterprises to rely on a separate tool, e.g., DUO, for two-factor authentication in addition to entering the login-name/password for the VPN. Cynorix authentication techniques can be integrated with existing VPNs, such as Cisco AnyConnect or OpenVPN, enabling the second factor authentication to operate automatically (unlike DUO, the user does not need to physically interact with her/his second authenticating device). On the other hand, if the user is willing to physically interact with her/his second authenticating device, then Cynorix authentication enhances the security by making the man-in-the middle attack impossible and enhances encryption by generating and utilizing a second encryption key, which is securely created relying on the network path used by the second authenticating device. Please see here for a detailed comparison between Cynorix authentication and DUO.