From the very beginning of data encryption, the world has wrestled with securing the encryption and decryption key. Never before has there been a solution for securing the encryption master key,

 

UNTIL NOW.....

Schedule a Demo

Protecting the Unprotectected

Key Shadowing is a patented secret sharing technology that permits a master key to be created, used to protect data in flight or at rest, “shadowed” into any number of parts, and then destroyed. The master key is never persistently stored. When the data needs to be accessed, a pre-defined number of the shadows (current options are 2, 3, or 4) must be used to regenerate the master key.

Stop living in Fear

Using old technologies, master keys are generally stored using a key management system. That system represents a single point of potential failure: If the system is hacked, a bad actor inside an organization grants access to the system, or the system is otherwise exposed, an organization’s master keys are exposed. Thus, their data is exposed.

 

Organizations have lost literally billions of dollars due to exposure of master keys. In addition, even if the organization catches potential exposure before incurring direct losses, they may have to re-encrypt all their protected data with new master keys, which can be a very expensive process especially for large organizations.

Products

KS API

KS API

The core KeyShadowing technology exposed through a RESTful API layer.

KS APIaaS

KS APIaaS

The KS API offered as a subscription service for enterprise customers.

KSLock

KSLock

KeyShadowing technology built directly into physical access.

SERVICES

SERVICES

Want to know how KeyShadowing tech can be used in your environment.

INTEGRATION

INTEGRATION

Want KeyShadowing tech embedded in your product.

HyperPass

HyperPass

A smart phone application to manage passwords leveraging the KeyShadowing API

COMING SOON...

COMING SOON...

At HyperSpace Inc. we are constantly developing and integrating new ideas.

Demo

KeyShadowing Demo

What is Shown?

 

The video shows ten key shadows generated for a randomly selected 512 bit master key. Every possible combination of four of those ten key shadows was then used to regenerate the master key. Unlike in a commercial use case, the master key was retained to verify the master key was properly regenerated every time. The retained master key was NOT used in the regeneration process.

 

While the math behind Key Shadowing technology is very complex, coding for the technology can run quickly with a small CPU and memory footprint. For example, the video was based on running Key Shadowing technology by a laptop with a standard AMD A6 processor. The technology has also been run by platforms ranging from a Raspberry Pi to a server.

 

Number of Tries

 

As shown in the demo video, a master key has been successfully regenerated almost 1,600,000 times. A little math: four out of ten key shadows for a master key can be combined in 5,040 ways. After running through all of those combinations, a new master key was randomly selected and the process re-started. Thus, regeneration of almost 900 master keys from 5,040 possible combinations of associated key shadows is shown.

 

Is There More?

 

Yes. Key Shadowing has been run over many months with literally millions of master keys regenerated from every possible combination of four out of ten key shadows WITH NO FAILURES. Application of the technology to master keys as large as 65,536 bits, generation of over 100 key shadows per master key, and other variations have been successfully validated.

Partners

iSG

ATLANTA, GA, FEB 15, 2018 - IntelligenceServicesGroup (iSG) joins HyperSpace Security, Inc. in bringing our patented key shadowing technology to market... (Full Press Release)

Contact

Email

Email us @

info@keyshadowing.com

Arrow Arrow

Twitter

Tweet @ us
@keyshadowing

Arrow Arrow

Address

6300 Powers Ferry Road
Suite 600-201
Atlanta, GA 30339

Arrow Arrow