Quantum-safe Electronic Signature

Since 2020, Carrousel Digital has been committed to digital security by providing solutions to security flaws that are still overlooked. Carrousel Digital has therefore developed various processes to improve cybersecurity: these processes have been patented, testifying their novelty.

 

Can you provide details on the quantum-safe electronic signature?

 

Digital signatures are used to provide the authenticity of a document, i.e.  for verifying that a document has not been altered in transit from its sender. Electronic signatures typically rely on digests of the document, which are then encrypted. However, Quantum computers are making these encryption functions vulnerable, for instance by recomputing the secret keys they use.

 

Random Hash signature from Carrousel Digital enables quantum-safe signing for very simple devices and existing computers; this signature uses secrets and, for encryption, one-time-keys that by essence cannot be decrypted, even by quantum computers.

 

The scheme can be used in many instances such as emails, or computer-to-computer communication.

 

The signature requires banks of one-time keys which are short random numbers, as it needs to use a new key for every different message. However, this is not an issue as this key can be relatively short and flash memory is abundant and cheap. For instance, 1GB of flash memory can store 250 million 32-bit keys, reducing the probability of a fake document going undetected to just 1 in 4 billion.

 

The processing required for the signature is also very simple requiring mostly hash functions, which are nowadays programmed in most chips, and in fact are already used for classical signatures.

Secure Hash

Can you please describe the other technics?

 

They each address a different problem and implement different technologies, sometimes very innovative, sometimes more traditional:

  The security of encryption keys is addressed by a patent relating to an electronic circuit that 'automatically' erases a memory space (containing encryption keys) when the data in another memory space (containing the code of a software) is modified, rendering hardware whose firmware would have been fraudulently uncovered unusable.
  An innovative  mechanism for transmitting information using entangled photons makes it possible to communicate in post-quantum security, by optical fibers or by satellite.
  A geolocation system that uses electromagnetic waves in the UHF to longwave range makes it possible to locate the counterparty of an online transaction, or a user, even when they are indoors and without any satellite use.
carrouseldigital.com
 

This newsletter was distributed by Government Technology published by Public Sector Information Ltd

We are processing your data under legitimate interest. For more information visit the ICO guidance. Your data may be provided to customers to enhance engagement  between buyers and suppliers in a B2G and B2B context.

To see our GDPR statement please click here. To unsubscribe click here