Our story began when we started working closely with the global defence and intelligence community to solve some of the most challenging problems around securely delivering large volumes of data over badly connected and untrusted networks in the battlefield. We partner with leading organisations to continue developing these capabilities to address challenges around privacy, identity and security in the digital world.
The development of quantum computers presents a significant threat to the security of data. The step change in computing power could render many of the current security protocols ineffective, leading to a requirement for a new generation of algorithms that can withstand these attacks. In collaboration with leading research organisations, we have been implementing algorithms that can withstand quantum attacks. We are studying the practical benefits and limitations of various classes of algorithms in order to contribute to the future standards for quantum resistant cryptography.
The growth of wireless networks in mobile and IoT has led to a significant increase in demand for bandwidth. Signal coverage remains patchy despite the upcoming deployment of 5G networks. The inconsistency of signal quality means that it is difficult to provide a good user experience, particularly for video and voice data. We are continuing to find new ways to use our patented combined compression and encryption to provide a better user experience and end-to-end security in connected vehicles to protection of energy infrastructure.
Generation, distribution and protection of encryption keys is one of the biggest challenges in secure communications. Public Key Cryptography has been fundamental to secure internet transactions. They are however becoming less relevant in the future due to the increasing need for compliance in enterprise environments, which require better audit and control of the data and low power devices in IoT lacking the computational power to run traditional public key algorithms. We have been developing Identity Based cryptography using protocols such as Mikey-Sakke to provide greater control and auditability of the data to the enterprises that own the data. Encryption keys are generated by a Key Management Server controlled by the enterprise, and are based on a unique piece of data that identifies an individual (eg. A phone number). The use of low complexity algorithms such as Elliptic Curve Cryptography that can run on lower power devices than traditional public key cryptography makes Identity Based encryption ideal for the next generation IoT networks.
Real-time video in applications like drone communications or military surveillance has enabled better decision making. The limitations of wireless networks, particularly in remote regions with poor connectivity, often lead to heavily compressed video that lacks sufficient quality. Our region-based compression ensures that the most critical objects in a video are detected and compressed at the highest possible quality. Less important background data in video is compressed heavily to free up precious bandwidth. From facial recognition to vehicle number plate detection, a variety of analytics engines are being integrated with the Ceerus platform to enable more use cases using real-time video over low bandwidth networks.