STRUCTURAL ENCRYPTION
Data sent to the cloud can be made safe by getting protection from structures in a DART encryption key
OUR SYSTEM INCLUDES
End-to-end protection
Everything that goes into the cloud is encrypted, so all a cloud hacker or interceptor gets is the encrypted data.
User control
The user is in full control of the encryption process. This happens locally on the user's device.
Zero knowledge
The user creates and stores the key locally. No one in the cloud has the key or the original data.
Authentication
Personal keys given to others can be made decrypt-only, preventing others from pretending to be you.
Designed for the cloud
Getting protection in part from structure gives new properties suited to protecting data in the cloud.
Hacker challenge
Try the challenge. Twenty encrypted files are offered for download and attack.
-
KEY FACT
DART's keyspace size derives in part from the number of addressable elements of structure.
OUR WORK
email client
An email client that transmits and receives encrypted email text.
encryption tool
An app to encrypt and decrypt files.
Cloud storage
Prototype cloud storage app uses end-to-end encryption as an additional layer of data protection.