Smartphones and tablets allow easy and convenient sending of images and information anywhere. But when it comes to sensitive data, security is important. Their widespread use makes tablets and smartphones a lucrative target for spies. CyphWay, developed at the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation (IOSB) closes this vulnerability. The core of CyphWay is a trusted hardware module, which encapsulates and protects safety-critical components, such as encryption, decryption, and key management, and ensures optimal protection of sensitive data.
Ever new cases of hacker attacks, data leaks, and espionage demonstrate the lack of data security when sending and receiving between workplace and cloud, between enterprise server and tablet, or from smartphone to smartphone. In many areas this prevents police, government agencies, and companies from taking full advantage of fast, mobile data communication. A business owner, for example, may want to send sensitive contract data to their company, for which they require a line that is secured against eavesdropping. A police officer who has taken a photo of the crime scene with a cellphone is not allowed to send the image to colleagues with standard communication technology. He may do this only if unauthorized access to the data can be excluded at the highest level of security. The experts for secure communication architectures at Fraunhofer IOSB are working on a highly secure communication solution that can be used with all available devices.
CyphWay provides data encryption and decryption
CyphWay – a small add-on device – provides a maximum-security channel for data transmission. “The safety systems of CyphWay have a modular structure. This allows for easy adjustment of the safety system to different application scenarios,” explains project leader Dr. Andreas Jakoby of Fraunhofer IOSB. One module, for example, specializes in the encryption and decryption of data. Another module provides a secure connection between the add-on device and the communication hardware used. This allows CyphWay to be connected both to stationary hardware – such as a desktop PC or a server environment – and to a tablet or smartphone via a wireless connection.
The cryptographic functions of CyphWay can be used for secure provision of data on a cloud, mobile access to corporate data, or secure telephone conferences. The connection between a smartphone or other mobile device and CyphWay can be established, for example, through an encrypted Bluetooth channel. For secure sending of photos taken with a cellphone camera, the image file is first transferred to the add-on device, where it is encrypted before being sent back to the cellphone as a secured file.
Tampering is futile
“Secured with strong cryptographic systems, the file can safely be sent to another mobile device or a server. Should it fall into the wrong hands, the transmitted information cannot be read and is useless to the data thief,” explains Jakoby.
At the recipient of the protected information the file is also processed by the security module of their CyphWay device and can then be viewed and edited on screen. Because the data encryption and decryption takes place entirely on the additional device, the encryption processes cannot be bypassed. Unauthorized access to and tampering with the add-on device are not possible.
Dipl.-Ing. Sibylle Wirth | idw
New MAX Infrared Oven is Five Times Faster For Glass Tempering
08.07.2016 | Heraeus Noblelight GmbH
International companies showcase their innovations at Medical Manufacturing Asia in Singapore
21.06.2016 | IVAM Fachverband für Mikrotechnik
Munich Physicists have developed a novel electron microscope that can visualize electromagnetic fields oscillating at frequencies of billions of cycles per second.
Temporally varying electromagnetic fields are the driving force behind the whole of electronics. Their polarities can change at mind-bogglingly fast rates, and...
Breakup of continents with two speed: Continents initially stretch very slowly along the future splitting zone, but then move apart very quickly before the onset of rupture. The final speed can be up to 20 times faster than in the first, slow extension phase.phases
Present-day continents were shaped hundreds of millions of years ago as the supercontinent Pangaea broke apart. Derived from Pangaea’s main fragments Gondwana...
Scaffolding and specialised workers help with the delivery – Heidelberg biochemists gain new insights into biogenesis
A type of scaffolding on which specialised workers ply their trade helps in the manufacturing process of the two subunits from which the ribosome – the protein...
Scientists at the Helmholtz Zentrum München have developed a new mass spectrometry imaging method which, for the first time, makes it possible to analyze hundreds of metabolites in fixed tissue samples. Their findings, published in the journal Nature Protocols, explain the new access to metabolic information, which will offer previously unexploited potential for tissue-based research and molecular diagnostics.
In biomedical research, working with tissue samples is indispensable because it permits insights into the biological reality of patients, for example, in...
Chemists at the University of Basel have succeeded in using computer simulations to elucidate transient structures in proteins. In the journal Angewandte Chemie, the researchers set out how computer simulations of details at the atomic level can be used to understand proteins’ modes of action.
Using computational chemistry, it is possible to characterize the motion of individual atoms of a molecule. Today, the latest simulation techniques allow...
15.07.2016 | Event News
15.07.2016 | Event News
11.07.2016 | Event News
22.07.2016 | Information Technology
22.07.2016 | Physics and Astronomy
22.07.2016 | Life Sciences