OVERVIEW OF INONVATION IN DIGITAL SECURITY

Since 2020, Carrousel Digital has been committed to digital security by providing solutions to security flaws that are still overlooked. Carrousel Digital has therefore developed various processes to improve cybersecurity: these processes have 

been patented, testifying their novelty. Can you please describe these technics?

 

They each address a different problem and implement different technologies, sometimes very innovative, sometimes more traditional:

  The post-quantum vulnerability in electronic signatures is addressed by an electronic signature using one-time keys and no encryption mechanism.
  The distribution of single-use keys for peer-to-peer use within a community is addressed   by the so-called single-use key distribution patent, allowing network less operations when necessary.
  the chaining of transactions carried out in offline mode making it possible to trace the history of financial transactions carried out in offline mode and thus allowing them to be checked a posteriori.
  The security of encryption keys is addressed by a patent relating to an electronic circuit that 'automatically' erases a memory space (containing encryption keys) when the data in another memory space (containing the code of a software) is modified, rendering unusable hardware whose firmware would have been fraudulently uncovered
  a mechanism for obfuscating a screen, as soon as a spy camera or a second person approaches the screen field of vision is detected, makes it possible to secure the use of PIN codes.
  A mechanism for transmitting information by entangled photons makes it possible to communicate in post-quantum security by optical fibres or by satellite.
  an optical router allowing the use of a photonic network for workstations, where a simple fibre connection of said stations to a single optical router suffices.
  a geolocation system using electromagnetic waves in the range of UHF to longwave, making it possible to geolocate the counterparty of an online transaction or a user, even when indoors.

The technologies implemented for these various innovations range from simple programming (post-quantum authentication, distribution of single-use keys, transaction chaining and verification of the user's PIN code environment), to electronics to photonics and quantum photonic technology. We are ready to license

these technologies so that everyone can benefit from them.

 

"Random hash  " is essential to counter the threats posed by quantum computers. How does Carrousel Digital integrate this technology into its digital security solutions, and what are the implications for industries looking to protect their data from emerging cyber threats?

 

Currently, electronic signatures use encryption that is susceptible to being broken by a quantum attack. A quantum computer is now able to decode a private key in 8 hours. The "random hash" we propose is a random electronic signature that is resistant to quantum attacks and does not use  any encryption function, because it is indeed the encryption functions that quantum computers make vulnerable. It is a simple solution, especially to implement,

which uses two one-time keys instead of encryption functions and inserts one of these keys into the document to be signed before calculating its hash or digest. It can be used, for example, for digital payment or identity verification, which allows any document included in a mobile application to be authenticated with  post-quantum security.

 

How does Carrousel Digital plan to integrate quantum security technologies into applications such as Moneytak to ensure the protection of its users' sensitive financial data, while making the user experience engaging?

 

Moneytak is an application that allows you to make online and offline payments, intended for all audiences. It allows you to carry digital euros. In this application, we use the "random hash " for the signing of messages, which helps detect fake transactions.  In addition, the application is using small keys, which make possible  securing communications in offline mode for a very large group of users, which can contain an entire population, for example. Thus, it makes transfers resilient to network crashes. You indicate the amount to be transferred to your phone, put it back to back with the other party’s phone and, thanks to NFC (Near Field Communication) the transfer is made, just like with connected payment terminal. The other part of the app is classical and allows transfers to and from a bank account. We have made a proof of concept for this application are happy send it for trial.

 

Carrouseldigital.com

Moneytak.fr

This newsletter was distributed by Counter Terror Business published by Public Sector Information Ltd

We are processing your data under legitimate interest. For more information visit the ICO guidance. Your data may be provided to customers to enhance engagement  between buyers and suppliers in a B2G and B2B context.

To see our GDPR statement please click here. To unsubscribe click here