Smartphones and tablets allow easy and convenient sending of images and information anywhere. But when it comes to sensitive data, security is important. Their widespread use makes tablets and smartphones a lucrative target for spies. CyphWay, developed at the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation (IOSB) closes this vulnerability. The core of CyphWay is a trusted hardware module, which encapsulates and protects safety-critical components, such as encryption, decryption, and key management, and ensures optimal protection of sensitive data.
Ever new cases of hacker attacks, data leaks, and espionage demonstrate the lack of data security when sending and receiving between workplace and cloud, between enterprise server and tablet, or from smartphone to smartphone. In many areas this prevents police, government agencies, and companies from taking full advantage of fast, mobile data communication. A business owner, for example, may want to send sensitive contract data to their company, for which they require a line that is secured against eavesdropping. A police officer who has taken a photo of the crime scene with a cellphone is not allowed to send the image to colleagues with standard communication technology. He may do this only if unauthorized access to the data can be excluded at the highest level of security. The experts for secure communication architectures at Fraunhofer IOSB are working on a highly secure communication solution that can be used with all available devices.
CyphWay provides data encryption and decryption
CyphWay – a small add-on device – provides a maximum-security channel for data transmission. “The safety systems of CyphWay have a modular structure. This allows for easy adjustment of the safety system to different application scenarios,” explains project leader Dr. Andreas Jakoby of Fraunhofer IOSB. One module, for example, specializes in the encryption and decryption of data. Another module provides a secure connection between the add-on device and the communication hardware used. This allows CyphWay to be connected both to stationary hardware – such as a desktop PC or a server environment – and to a tablet or smartphone via a wireless connection.
The cryptographic functions of CyphWay can be used for secure provision of data on a cloud, mobile access to corporate data, or secure telephone conferences. The connection between a smartphone or other mobile device and CyphWay can be established, for example, through an encrypted Bluetooth channel. For secure sending of photos taken with a cellphone camera, the image file is first transferred to the add-on device, where it is encrypted before being sent back to the cellphone as a secured file.
Tampering is futile
“Secured with strong cryptographic systems, the file can safely be sent to another mobile device or a server. Should it fall into the wrong hands, the transmitted information cannot be read and is useless to the data thief,” explains Jakoby.
At the recipient of the protected information the file is also processed by the security module of their CyphWay device and can then be viewed and edited on screen. Because the data encryption and decryption takes place entirely on the additional device, the encryption processes cannot be bypassed. Unauthorized access to and tampering with the add-on device are not possible.
Dipl.-Ing. Sibylle Wirth | idw
AchemAsia 2019 will take place in Shanghai
15.06.2018 | DECHEMA Gesellschaft für Chemische Technik und Biotechnologie e.V.
Insects supply chitin as a raw material for the textile industry
05.06.2018 | Fraunhofer-Institut für Grenzflächen- und Bioverfahrenstechnik IGB
A new manufacturing technique uses a process similar to newspaper printing to form smoother and more flexible metals for making ultrafast electronic devices.
The low-cost process, developed by Purdue University researchers, combines tools already used in industry for manufacturing metals on a large scale, but uses...
For the first time ever, scientists have determined the cosmic origin of highest-energy neutrinos. A research group led by IceCube scientist Elisa Resconi, spokesperson of the Collaborative Research Center SFB1258 at the Technical University of Munich (TUM), provides an important piece of evidence that the particles detected by the IceCube neutrino telescope at the South Pole originate from a galaxy four billion light-years away from Earth.
To rule out other origins with certainty, the team led by neutrino physicist Elisa Resconi from the Technical University of Munich and multi-wavelength...
For the first time a team of researchers have discovered two different phases of magnetic skyrmions in a single material. Physicists of the Technical Universities of Munich and Dresden and the University of Cologne can now better study and understand the properties of these magnetic structures, which are important for both basic research and applications.
Whirlpools are an everyday experience in a bath tub: When the water is drained a circular vortex is formed. Typically, such whirls are rather stable. Similar...
Physicists working with Roland Wester at the University of Innsbruck have investigated if and how chemical reactions can be influenced by targeted vibrational excitation of the reactants. They were able to demonstrate that excitation with a laser beam does not affect the efficiency of a chemical exchange reaction and that the excited molecular group acts only as a spectator in the reaction.
A frequently used reaction in organic chemistry is nucleophilic substitution. It plays, for example, an important role in in the synthesis of new chemical...
Optical spectroscopy allows investigating the energy structure and dynamic properties of complex quantum systems. Researchers from the University of Würzburg present two new approaches of coherent two-dimensional spectroscopy.
"Put an excitation into the system and observe how it evolves." According to physicist Professor Tobias Brixner, this is the credo of optical spectroscopy....
13.07.2018 | Event News
12.07.2018 | Event News
03.07.2018 | Event News
20.07.2018 | Power and Electrical Engineering
20.07.2018 | Information Technology
20.07.2018 | Materials Sciences