Verifiable Identity-Based Encryption (VIBE)

Eliminates Public-Key Certificates

Simplifying Authentication and Encryption Key Management, at Half the Cost

Trust Nothing. Authenticate Everything.®
That’s our mantra and it speaks to the power and importance of VIBE – new-age crypto for new age security problems.
Discover the difference.
VERIFIABLE IDENTITY-BASED ENCRYPTION (VIBE)
Identity-Based Encryption (IBE) was first proposed by renown cryptographer Adi Shamir in 1984, and advanced in 2001 as a “breakthrough approach to encryption key management.” Since then, dramatic growth in scale and complexity across our connected world has brought formidable threats that exploit thousands of cybersecurity vulnerabilities, daily. This next-generation of IBE is transformational, in that it includes certificate-less authentication, with strengthened key exchange verification. VIBE is identity-based encryption designed to meet the oncoming era of sophisticated cybersecurity threats.
Previous slide
Next slide

WHY VIBE?

Fundamental to data security is the ability to verify users, devices, and data as authentic – that their identities and content have not been compromised. VIBE provides each user or device with a secure, private, verifiable identity – a digital stamp that prevents alteration of data content or theft of users’ identities. With VIBE-inside, email phishing, unauthenticated news sources, deep fakes, and data compromise are all prevented.

Globally-connected and diverse public Clouds, private servers, big data warehouses, third-party software platforms make user and data authentication crucial. Traditional encryption, like that of Public Key Infrastructure (PKI), is costly, inflexible, slow, and strewn with inherent vulnerabilities that make it unusable in our 21st century digital world. By design, VIBE is made for today’s dispersed, interconnected, mobile, high-speed virtual world.

VIBE’s certificate-less user and data authenticated encryption technology ensures scalability, dynamic key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC). VIBE eliminates the need for costly, cumbersome PKI. It is perfectly suited to secure Applications, Cloud, Internet of Things (IoT), Collaboration platforms, Blockchain, FinTech systems, Email, V2V, V2X, Smart City and virtually every other connected solution that is in need of ironclad authentication and encryption.

VibeCyber Review

REQUEST A MEETING

If you have an application or service offering that you are seeking to secure, please send us a message and let’s start a conversation.

info@VIBEcyber.com

VIBE DESCRIBED

VIBE is an acronym for Verifiable Identity-Based Encryption.
It is certificate-less and disrupts popular authentication and key exchange protocols. VIBE enables Zero-Trust networking by authenticating all users, devices, data, and transactions at the application layer. With VIBE, there is no need to protect public parameters, making it resistant to man-in-the-middle attacks. The patented VIBE cryptosystem also solves chronic key management problems involving Key Reissuance, Key Revocation, Key Escrow and Digital Signing. VIBE is made for today’s collaborative, connected, digital world.

Certificate-Less

VIBE is certificate-less, eliminating the set up and management challenges associated with certificate based solutions.

Benefits
Unlike PKI, VIBE is designed to scale to the levels required for massive deployments characteristic of the Internet of Things and Blockchain. With no certificates to manage, VIBE applied can protect billions of devices with ease.

Authentication at the Application Layer

In an increasingly treacherous cyber-security landscape. VIBE authenticates the sender of a message, be it person or thing.

Benefits
By authenticating or verifying the sender of every message, VIBE ensures that any and all messages received are from trusted sources.

Data at Rest

VIBE keeps data secure and can authenticate users according to client policies which govern level of access.

Benefits
Data is highly vulnerable to outside threats, and not a day goes by when yet another supposedly protected system is hacked and valuable information is stolen. VIBE ensures that data is only available to authenticated parties, locking out cybercriminals and better protecting people, places and things.

Lightweight

VIBE has a very small digital footprint.
 
 

Benefits
Given its light code and power requirements, VIBE can easily be embedded on microchips, Gateways and SIMs etc., and it elegantly enables authentication and key exchange.

Flexible

VIBE can be used with embedded private keys on devices and end-points, and/or with no requirement for secure local storage.

Benefits
Trust Centres (TC’s) can be embedded on a chip and you can configure them for cross-domain secure communication, between stand-alone trust centres. In this way, it’s social by design.

Key Exchange

VIBE is an asymmetric encryption and authentication scheme, that provides absolute security and the simplicity to share the secret keys with anyone.

Benefits
Fresh, new, random, asymmetric keys generated for each transaction, securely authenticating and exchanging the symmetric keys of your choice.

APPLICATIONS

VIBE is not a solution. It is a cryptographic ingredient that can be embedded in your connected products, services and solutions, with applicability in virtually every industry.

The Cloud

The Cloud is becoming increasingly pervasive as businesses, large and small, and governments at all levels are migrating applications to the Cloud. Cloud security, however, is an ongoing issue, one exacerbated by the emergence of Edge and Fog computing technology designed to better accommodate the massive number of devices connected to the Cloud. The unique nature of the VIBE cryptographic schemas is that it can easily and successfully secure all elements of the Cloud, and the myriad applications it enables, as VIBE authenticates at the application level – from the Edge to the Core. This renders VIBE an ideal security solution for governments and enterprises, particularly those that use third-party services and applications for internal communication, data storage and computing resources. With VIBE, organizations can host their own Trusted Centres to issue private keys to secure all communications, and to fully protect their intellectual property.

Cloud applications that VIBE can more effectively secure include:

  • Encrypted Email
  • Secure Voice
  • Secure Record Management (i.e. in Healthcare and Social Services)
  • Secure Supply Chain and MRO Management
  • Secure Data Storage/Warehousing and Business Intelligence Services
  • Secure Building Management Services (BMS)
  • Any IoT Services with authenticated encryption demand

VIBE-enabled Cloud solutions easily and economically scale to any level, and deliver security at a level unparalleled in the industry.

Internet of Things
(Platform, Devices, Semiconductors)

Commonly devices rely on semiconductors as a part of their functionality and increasingly, these products are able to communicate with each other through the Internet. There are very few security standards within the IoT and yet millions of devices are being deployed daily with no embedded security. Dated security approaches such as PKI are overly complex to set up and manage, are highly vulnerable to outside threats, are costly and cannot scale.

Mobile Communications/Blockchain

Mobile and Blockchain developers can deploy VIBE to provide secure authentication of users and or/transaction, and to economically and seamlessly handle key exchange requirements. Its certificate-less feature and peer-to- peer functionality make it a perfect security ingredient for e-banking solutions and so much more.

Enterprise/Government Communications
(email, VOIP, FTP, Collaboration)

VIBE is “Social by Design” meaning that organizations can set up Trusted Centres (TC) wherein only users or devices registered as members of the TC can communicate with one another. Typically, a TC would be housed in a Hardware Security Module (HSM). Members of one TC can communicate with members of another TC on a permissions/rules basis. Once set up, the TC can be taken offline eliminating the threat of the TC being hacked.

As a use case, an Enterprise like a bank might register all its email users in one TC, and have its clients register in another. With permission, the only email communication that could occur would be from registered or authenticated users. Attempts by outside parties to “phish” within the company’s digital waters would be automatically thwarted as the intended recipient would never receive the nefarious communication.

VIBE IoT DEMO

VIBE IOT SECURITY WHITEPAPER

CONTACT

Send us a message and let’s start a conversation.

info@VIBEcyber.com

    Andrew Parlock

    Andrew Parlock

    Advisor

    Andrew is a senior executive with extensive background in Applications Engineering, and in particular, Business Development. With an MBA, and an undergrad degree in Aerospace (aka “rocket science”), and having realized high-level security clearance with the US Government, Andrew is a subject-matter expert when it comes to helping our team navigate the complex world of government and its related businesses and agencies. In Andrew’s words, he “thrives in the chaos of the unknown where so many opportunities exist.”

    Andrew is a senior executive with extensive background in Applications Engineering, and in particular, Business Development. With an MBA, and an undergrad degree in Aerospace (aka “rocket science”), and having realized high-level security clearance with the US Government, Andrew is a subject-matter expert when it comes to helping our team navigate the complex world of government and its related businesses and agencies. In Andrew’s words, he “thrives in the chaos of the unknown where so many opportunities exist.”

    Chuck Brooks

    Advisor

    Named Top Person To Follow on Tech by LinkedIn. Former Technology Partner Advisor at Bill and Melinda Gates Foundation. Helped “stand up” Office of Legislative at DHS. Served as first Director of Legislative Affairs at the DHS Science & Technology Directorate. A thought leader, influencer, technology evangelist. A featured writer/speaker/blogger. Topics include: homeland security, cyber security, CBRNE, artificial intelligence (AI), Internet of Things (IoT), science & technology, public/private partnerships, risk management, blockchain, innovation. Published in FORBES, Huffington Post, InformationWeek, MIT Sloan Blog, Computerworld, Federal Times, NextGov and many more.

    Olivier Rouit

    Senior Embedded Security Architect

    Formerly educated with a degree in Applied Electronics Engineering and Industrial Computer Science from ENSEA, France, and in Artificial Intelligence from the renowned ENSIMAG University in Grenoble. France, Olivier’s first significant role in Applied Research was with Gemplus’s Telecom Division. An expert in embedded security, Olivier has worked extensively on numerous research projects ranging from the first implementation of an EAP SIM, in collaboration with CISCO, to the first implementation of a Javacard OTP with Verisign. Recognized as an expert in identity-management embedded technology, Olivier is an award-winning engineer who today is leading embedded development projects for VIBE.

    Heiko Vetkamp

    Heiko Vetkamp

    Advisor

    Heiko worked at Philips for 13.5 years in several European countries, and he worked at Halo Creative & Design Ltd. at its headquarters in Hong Kong and Operations in China & US.  Heiko is a co-founder of Purive.  Heiko is a practical, professional manager with a proven track record in Supply Chain, Customer service, Planning & Logistics, Key account and Sales Management, General Management and Change Management.  Being a Certified Lean Six Sigma Black Belt, Heiko has experience in leading complex multi-site international supply chain projects, customer service & logistics management, the building and managing of intensive partnerships on several levels for international key accounts and distributors, the building of effective sales organisations, profit & loss responsibility, business development, and large integration and change management projects.

    Heiko has a Master of Science (MSc) in Industrial Engineering from the Georgia Institute of Technology, in Atlanta with a focus on Economic decision analysis, and a Master of Science (MSc) in Mechanical engineering from the University of Twente in the Netherlands with a focus on Production and Operations management.  Today Heiko lives in Netherlands.  Heiko speaks Dutch, English, and German.

    Craig Stark

    Craig Stark

    Advisor

    Craig Stark has over 30 years of Business Development experience with new technologies and bringing complex solutions to market from large to start-up sized companies. With deep experience in strategic partnerships, channel development, solution marketing, product and industry marketing, Craig uses an agile, collaborative approach of innovation management to build sustaining value for partners and clients. Craig has focused on IoT and transformative technologies for the past five years. His current work with Strategy of Things focuses on Smart Systems, Smart Buildings, and Platform Business Models. Prior to that, he spent six years in the smart systems development business, where he served as CTO and co-lead in design authority at Blackstone Gates, an international CX and loyalty strategy consultancy. Craig has served on the CIO Strategy Council (Data and Security Standards), The Conference Board of Canada (advisory on IP strategy) and as an industry partner for the Innovation, Science and Economic Development for the National IP Strategy council and currently supports the NSERC National IoT Research Chair in support of bridging applied research to several industry segments. Craig has supported research efforts for the US NIST IoT Infrastructure investment project to apply to several industry and vendor segments.

    Paul Hager

    Paul Hager

    Advisor

    Paul has extensive experience in cybersecurity. He served as the U.S. Representative to NATO for Information Security. As Special Assistant to the Director of the NSA he participated in technology research, investment, and partnerships in international cybersecurity and telecom technologies. Early in his NSA career, he carried out system penetration testing (hacking), and was an early team member of the first U.S. National Computer Security Center. Paul has authored national and international policies and publications/books on information security. Paul earned his M.B.A. in Corporate Finance from the University of Pennsylvania Wharton School of Business, and a Master of Public Administration (MPA) in International Policy, from Harvard University. His undergraduate degrees are from the University of North Carolina, a B.S. in Mathematics and a B.A. with Honors in Psychology.

    Bob Bergman

    Standards Strategy

    A total of 50 years of experience in software engineering, Decision Sciences, System Dynamics Modeling, Scenario Planning, International Standards, business strategy synthesis, and simulation. Bob’s background includes 12 years of flight simulator design for USAF high-performance aircraft and 28 years at Intel applying quantitative decision methodologies to improve international standards negotiations and strategic business decisions. Bob represented Intel at GSM Association, 3GPP (wireless com standards), IETF, oneM2m (IOT standards), and Open Mobile Alliance (Digital Rights Management standards). Bob attended MIT and SUNY at Albany earning a BS degree in Electrical Engineering & Computer Science, with graduate work in system dynamics.

    Dr. William “Dollar” Young, Jr

    Advisor

    Dr. William “Dollar” Young, Jr is an accomplished strategist and technical leader with 31 years in the United States Air Force. His last Air Force position was as the initial commander of the Air Force’s newest operational organization, a first-of-its-kind wing tasked to deliver Electromagnetic Spectrum capabilities to all Air Force weapon systems and platforms via “missionware” applications, mission data, advanced networking and Electromagnetic Warfare Artificial Intelligence/Machine Learning algorithms.

    Dr. Young is the creator of System-Theoretic Process Analysis for Security (STPA-Sec). STPA-Sec is the security analysis framework used to help secure many of America’s most complex new weapon systems. Dr. Young is a former consultant for MIT Lincoln Laboratory where he worked on new Security Engineering Analysis methods for the lab’s Cyber System Assessments Group. He is an Associate Research Professor at Syracuse University in the Electrical Engineering and Computer Science Dept. In this role, he is currently developing a new methodology for securing Internet of Things devices. Dr. Young previously served as the Chief Strategist for the Commander of the Air Force Air Education & Training Command.

    Dr. Young earned his PhD at the Massachusetts Institute of Technology (MIT) in 2016 in Systems Engineering with an emphasis in Secure Systems Engineering. He has four Master’s Degrees. Dr. Young was one of the initial graduates of the Air Force’s Grand Strategy Program. He has a Bachelor of Science in Engineering Science with an emphasis in Electrical and Aeronautical Engineering.

    Alfred Berkeley

    Advisor

    A former president of NASDAQ. Was a Captain in the 438th Military Airlift Wing, and served as a Major in the USAF Reserve. He has testified before the Joint Committee on Economics of the US Congress, and before the House Science Committee, the House Permanent Select Committee on Intelligence, and the House Committee on Homeland Security. Served on the International Advisory Council for the Monetary Authority of Singapore, and is currently on the Board of Visitors of the University of Maryland School of Medicine, and a Trustee of Hollins University. Al earned a B.A. from the University of Virginia, and received his M.B.A. from The Wharton School at the University of Pennsylvania.