High Entropy Security
Overview
HES is focused on cybersecurity schemes for cryptographic key vulnerabilities in jammed, Zero-Trust environments. For terminal devices like UASs, the keys are vulnerable when they’re stored in memory or are transmitted through unsecured networks in data packets. With signal jamming, most UAS data packets are only able to handle about 20-25% bad bits before they become unusable for the tactical operators and mission analysts. The critical problem is ensuring usable data packets get through to UASs even with bad bits in the transmission. More usable packets mean lower latencies and smoother operation. Stronger cybersecurity around the keys is 100% needed.
Our lightweight, quantum-resistant protocols (TRL 4) enable ground-to-terminal device key recovery in jammed/poor networks. The ephemeral keys are regenerated on demand, in real time, and never stored. Even with 45% bad bits in the transmission, the keys are error-free.
Co-founder Bertrand Cambou is an expert in physical unclonable functions, ternary computing, quantum key distribution, and device fingerprinting for secure authentication, with our methods protected by 80+ issued/pending patents. His experience includes Gemplus, Ingenico, Crocus, SST, AMD, and Motorola.
With foundational research funded by AFRL, we are funded by ARL’s Program FREEDOM and on track for field testing at Kostas Research Institute, championed by Sean Pascoli (ARL) and Donald Telesca (AFRL). We are going after SBIR/DIU/BAA opportunities and have partnered with defense consultant Alex Dely of Raytheon for contracts with primes and other funding. Our cyber schemes are applicable across public key infrastructures and device security, with dual-use in fintech and autonomous systems, including crypto wallet security with the ability to regenerate the private key as a service, as well as sensor cybersecurity for autonomous systems.