The trusted alternative to mass market instant messaging solutions
Boost communication by inviting thousands of members in dedicated chat rooms!
Cryptobox provides businesses and organizations with a sharing and collaboration solution to secure internal and external exchanges, using end-to-end encryption.
Cryptobox is the first secure sharing and collaboration solution to provide end-to-end data encryption, whether your device is a smartphone or a computer.
The digital transformation affects all businesses and organizations, from the smallest to the largest. This transformation brought about by technological developments offers many benefits:
To meet the new challenges of mobility and remote work, Ercom has developed Cryptosmart PC, a sovereign VPN solution to secure the connections of your remote Windows computers.
Cryptosmart is the only “Restricted” French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications on consumer devices.
Posted 18 avril 2016
An algorithm is an effective method that can be expressed within a finite amount of space and time and in a well-defined formal language for calculating a function*. Today, algorithms are running computers, used in cryptography, in routing information, in planning and optimizing resources, in word processing, etc. The American TV series “NUMB3rs” has, between 2005 and 2010, popularized the use of algorithms in our daily lives: the main character uses them to solve criminal cases for the FBI**.
There are many types of algorithms:
– Algorithms to compute fingerprints, which are a short set of features representing a content (one way function): such as SHA (Secure Hash Algorithm) and MD (Message Digest). The most recent ones are the most resistant against hacking attempts (SHA-2 et MD-6), older ones have been broken and are very fast to compute. For instance, Microsoft uses MD4 to encrypt passwords in NTLM.
– MAC (Message Authentication Code)*** computation allows to add an origin and integrity validation to a message or content: only the legitimate sender of the message would have been able to produce this code, so in addition to origin validation, MAC guaranties integrity thanks to a key. MAC algorithms are mainly used in SHA-type (SHA-2 or SHA-3) or MAC-type fingerprint calculation. These algorithms are, for example, used in secure communications, with an IPSec-type (Internet Protocol Security) VPN (virtual private network). MAC computations are fast, in opposition to RSA-based asymmetric fingerprint computations.
– Symmetric encryption algorithms, such as AES, RC, DES, etc. They are typically used for encrypting content for confidentiality purposes. A common key has to be already shared between two individuals or machines, or a key negotiation protocol has to be used (such as Diffie and Hellman –DH-).
– Asymmetric algorithms: That’s typically RSA (derived from the names of the cryptographs Rivest, Shamir and Adleman) which allows confidentiality by using a “public” key to encrypt, and the receiver uses a “private” key to decrypt the information. It also allows authentication with private-key signing, the receiver can use their public key to check the signature. The advantage of asymmetric algorithms is the possible broad diffusion of public key while the owner keeps their private key. Despite some latencies, these algorithms have clear advantages by allowing data exchange or document signing between unconnected parties; Appending a signature, for example, lets one party perform an “off-line” verification.
Using cryptography is, at the end, only implementing these types of algorithms. Yet, it is still better to be certified, by a CESTI for instance, to be sure of implementing them properly.
Cet article vous a plu ? N'hésitez pas à le partager