Services Provided:
1. Consulting in
Information Security Risk Analysis
Enterprise Security Architecture
Identity & Access management Management
IBM TIM & TAM
Enterprise Identity management strategies
Encryption Strategies
Enterprise Certifying Authority
Time Stamping
2. 01edge Security Solutions
Problem:
You want an enterprise wide identity generation & higly secure acess Management.
You want total security of classified documents in storage in the workstations and servers in the enterprise network.
You want total security of all classified files in transit in the LAN,MAN,WAN or the Internet.
You want total security of classified documents in transit between two workstations across the world connected through
secure or even insecure networks.
It should be practically unbreakable by any one in the world including technologically advanced western governments.
You do not want to take the trouble of sending secret keys through secure channels
Solution:
Very high security Secret key system augmented by Public Key crypto system to encrypt the session key.
Private key encrypted with password in the recipients computer.
Key Highlights:
Uses 256 bit AES Rijndael cipher or any of the other 8 algorithms for block encryption
Being secret key encryption, it is reasonably fast.
AES 256 bit is certified to be extremely secure, in fact the best available technology in the world as of 2003.
2 256 key combinations or 1.1x10 77 possible key combinations
If a computer could crack DES by trying 56 keys in 1 second, the same computer would require 149 trillion (149x 10 raised
to 12) years to crack Rijndael 256 bit key. (For a comparison, the universe is estimated to be less than 20 billion (20 x
10 raised to 9) years old)
No secret key exchange as the secret key is encrypted with the RSA 1024 bit Public Key and appended to the encrypted file.
Encryption of private key done with Twofish 256 bit hash key.
Rich Feature set includes:
Other encryption Systems based on DES, Triple DES, Blowfish, Twofish, IDEA, RC5 and RC6.
For extra security, multiple iteration of any algorithms up to 9 times (exactly as DES is to Triple DES)
Key generation of RSA keys 1024 and 2048 bits.
Shredding of input files by complete obliteration from the disk to make it totally non-recoverable.
Single cycle encryption even for multiple addressed documents using multiple public keys.
Digital signing of documents with ones private key for cent percent authentication and non-repudiation.
Fool proof verification of these digital signatures.
Enterprise internal CA (Certifying Authority) signing to facilitate internal cost effective PKI.
Time stamping of documents for proof of existence at points in time.
Time stamp verification of time stamped documents.
Establishment of a secured channel with Diffie-Hellman Key-agreement protocol based encrypted channel between two parties
with out physical exchange of secret keys.
Value Proposition of 01edge Security Engine:
High security encryption needing no secret key exchange and providing security in storage and sharing.
Choice of varying degree of security with a range of algorithms and multiple iterations all available for choosing.
Shredding of input files providing total obliteration of input files.
Every thing required for starting of an internal CA signature sytem and providing signed crtificates to internal professionals.
Time stamping of internally generated documents for proof of existence
Establishment of a secured channel with any one connected to the internet
|