Data Protection

Security and the protection of shared data is the core focus of the Cy4Secure product line. Bonafeyed spent years developing technology enabling Cy4Secure to protect all data all the time. To make this possible, Bonafeyed created an approach for encryption and management that interoperates with existing network security technologies and is compatible with applications that run on endpoint devices or in the cloud. Cy4Secure utilizes encryption technology designed to protect data through the next decade, operates on the simplest devices, and eliminates the arduous task of managing encryption keys.


At the heart of Cy4Secure’s data protection is an 800-bit stream cipher algorithm. It is based on the industry hardened Mersenne Twister (MT) algorithm for its keystream. MT is commonly found and used in applications such as Microsoft’s Excel, Mathworks’ MatLab, and Wolfram Research’s Mathematica and development languages such as C++, GNU, PHP and Python. Bonafeyed's patented cryptographic technology brings the strength of block ciphers to the speed of stream ciphering. The National Security Agency (NSA) has used stream ciphers since the 1950’s and it has many advantages. It can achieve a high security level with much less computational effort than the more common block ciphers. Stream cipher protected data is more difficult to attack because of the changing states and it is extremely fast. Another benefit is the detection of data corruption with encryption. Cy4Secure, when decrypting, constantly checks the integrity of the data and can flag when data has rotted. In other words, a user will not wait for any cryptographic operations, Cy4Secure can run on small computing devices and protected data is more secure than using commonly available encryption programs.



The next challenge in securing data is managing all of the cryptographic keys created to protect data. Today, whether it’s a simple password or a complex 800-bit key, users are forced to individually manage these keys to access data. Cy4Secure streamlines all of this by associating keys with the email address with whom protected data is shared. This can be a group of people, a distribution list or a single individual. Access to protected data is akin to an access control list for the IT organization or as simple as selecting recipients from a user’s contact list.


Once data is securely protected, keys are fully automated. Access can be easily controlled by the owner/sender for shared data located on other servers, in the cloud or on recipients’ computers. Availability of the decryption keys can be defined in many ways: When it can be first accessed, Time to Birth; How long it can be accessed, Time to Live; Or where it can be geographically accessed. Access permission can be revoked at any time. In the case when Once data is securely protected, keys are fully automated. Access can be easily controlled by the owner/sender for shared data located on other servers, in the cloud or on recipients’ computers. Availability of the decryption keys can be defined in many ways: When it can be first accessed, Time to Birth; How long it can be accessed, Time to Live; Or where it can be geographically accessed. Access permission can be revoked at any time. In the case when Cy4Secure protected data is lost, stolen, abandoned or forgotten, it remains secure and becomes permanently inaccessible once access is removed or retired ensuring cybercriminals or non-authorized users only obtain unintelligible data. protected data is lost, stolen, abandoned or forgotten, it remains secure and becomes permanently inaccessible once access is removed or retired ensuring cybercriminals or non-authorized users only obtain unintelligible data.

 

Authentication

Multi-factor System Ensures Recipients are Authorized to View Protected Data