Data sent to the cloud can be made safe by getting protection from structures in a DART encryption key
OUR SYSTEM INCLUDES
Everything that goes into the cloud is encrypted, so all a cloud hacker or interceptor gets is the encrypted data.
The user is in full control of the encryption process. This happens locally on the user's device.
The user creates and stores the key locally. No one in the cloud has the key or the original data.
Personal keys given to others can be made decrypt-only, preventing others from pretending to be you.
Designed for the cloud
Getting protection mainly from structure (rather than algorithm) gives new properties suited to protecting data in the cloud.
DART's keyspace (the number of possible keys) is up to factorial 4 billion, much larger than other encryption methods. This hardens DART against quantum computer key attack.
factorial 4 billion keys
An email client that transmits and receives encrypted email text.
An app to encrypt and decrypt files.
Our cloud storage app under development uses our end-to-end encryption as an additional layer of data protection.