Research & Development

Access the latest technologies that are shaping the
future standards in quantum resistant & identity
based cryptography

Development of secure communications for emerging threats

Our story began when we started working closely with customers in the defence and intelligence communities to solve some of the most challenging problems around securely delivering large volumes of data over badly connected and untrusted networks. Today, we partner with many leading organisations to continue developing these capabilities to address challenges around privacy, identity and security in the digital world.

Quantum resistant cryptography

The development of quantum computers presents a significant threat to the security of data. The step change in computing power could render many of the current security protocols ineffective, leading to a requirement for a new generation of algorithms that can withstand these attacks. In collaboration with leading research organisations, we have been implementing algorithms that can withstand quantum attacks. We are studying the practical benefits and limitations of various classes of algorithms as our contribution to future quantum resistant cryptography standards.

Identity based cryptography & key management

Generation, distribution and protection of encryption keys is one of the biggest challenges in secure communications. Whilst Public Key Cryptography has been fundamental to secure internet transactions, it is becoming less relevant due to the increasing need for compliance in enterprise environments, requiring better data audit and control, and low power devices in IoT lacking the computational power to run traditional public key algorithms. We have been developing Identity- Based cryptography using protocols such as MIKEY-SAKKE to provide greater data control and auditability. Encryption keys are generated by a Key Management Server controlled by the enterprise, and are based on a unique piece of data that identifies an individual (such as a phone number). The use of low complexity algorithms such as Elliptic Curve Cryptography that can run on lower power devices makes Identity Based encryption ideal for next generation IoT networks.

Combined compression & encryption

The growth of wireless networks in mobile and IoT has led to a significant increase in demand for bandwidth. Signal coverage remains patchy despite the imminent deployment of 5G networks. The inconsistency of signal quality makes it difficult to provide a good user experience, particularly for video and voice data. We are continuing to find new ways to use our patented combined compression and encryption to improve user experience and end-to-end security in applications ranging from connected vehicles to protection of energy infrastructure.

Region based compression

Real-time video in applications like drone communications or military surveillance has enabled better decision making. The limitations of wireless networks, particularly in remote regions with poor connectivity, often lead to heavily compressed video that lacks sufficient quality. Our region-based compression ensures that the most critical objects in a video are detected and compressed at the highest possible quality. Less important background data in video is compressed heavily to free up precious bandwidth. From facial recognition to vehicle number plate detection, a variety of analytics engines are being integrated with the Ceerus platform to enable more use cases using real-time video over low bandwidth networks.