Introducing VIBE Cyber

Trust Nothing. Authenticate Everything. That’s our mantra and it speaks to the power and importance of VIBE – new-age crypto for new age security problems.
Discover the difference.

Twitter
LinkedIn

VERIFIABLE
Identity-Based Encryption

Identity-Based Encryption (IBE) was proposed in 1984 by renowned cryptographer, Adi Shamir, and advanced in the 1990s as a “breakthrough approach to encryption key management.” Our connected world has changed a lot since then, however, and in response to today’s cybersecurity challenges, VIBE Cyber is bringing to market next-generation IBE. VIBE dramatically improves on IBE by eliminating the need to protect the public parameters and adding authentication at the application layer.

Twitter
LinkedIn

VIBE Described

VIBE is an acronym for Verifiable Identity Based Encryption.
It is certificate-less and disrupts popular authentication and key exchange protocols.

Certificate-Less

Certificate-Less

VIBE is certificate-less, eliminating the set up and management challenges associated with certificate based solutions.

Benefits Unlike PKI, VIBE is designed to scale to the levels required for massive deployments characteristic of the Internet of Things and Blockchain. With no certificates to manage, VIBE applied can protect billions of devices with ease.

Authentication at the Application Layer

Authentication at the Application Layer

In an increasingly treacherous cyber-security landscape. VIBE authenticates the sender of a message, be it person or thing.

Benefits By authenticating or verifying the sender of every message, VIBE ensures that any and all messages received are from trusted sources.

Data at Rest

Data at Rest

VIBE keeps data secure and can authenticate users according to client policies which govern level of access.

Benefits Data is highly vulnerable to outside threats, and not a day goes by when yet another supposedly protected system is hacked and valuable information is stolen. VIBE ensures that data is only available to authenticated parties, locking out cybercriminals and better protecting people, places and things.

Lightweight

Lightweight

VIBE has a very small digital footprint.

Benefits Given its light code and power requirements, VIBE can easily be embedded on microchips,
Gateways and SIMs etc., and it elegantly enables authentication and key exchange.

Flexible

Flexible

VIBE can be used with embedded private keys on devices and end-points, and/or with no requirement for secure local storage.

Benefits Trust Centres (TC’s) can be embedded on a chip and you can configure them for cross-domain secure communication, between stand-alone trust centres. In this way, it’s social by design.

Key Exchange

Key Exchange

VIBE is an asymmetric encryption and authentication scheme, that provides absolute security and the simplicity to share the secret keys with anyone.

Benefits Fresh, new, random, asymmetric keys generated for each transaction, securely authenticating and exchanging the symmetric keys of your choice.

REQUEST A MEETING

If you have an application or service offering that you are seeking to secure, let’s start a conversation.

Learn More

Why VIBE?

The connected world as we know it today is badly broken. Effective security is inhibited by the high costs of Public Key Infrastructure (PKI), its inherent vulnerabilities and its other technical limitations; the existing patchwork approach to security clearly does not work.

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC). VIBE is perfectly suited to secure the Internet of Things (IoTs), the blockchain, other fintech systems, email, and virtually every other connected solution that is in need of ironclad security. By design, VIBE eliminates the need for costly, cumbersome PKI.

Bill Buchanan Professor of Cryptography, Napier University, Edinburgh, Scotland

“One day, and I think it might be soon, we will wake up and RSA will be cracked. Either it will be super computers cracking the prime numbers, or it will be quantum computers, but when it happens there will be no proper identity on the Web and all the tunnels will be broken.”

Isaac Chuang Professor of Physics, Electrical Engineering & Computer Science, MIT

”If you are a nation state, you probably don’t want to publicly store your secrets using encryption that relies on factoring as a hard-to-invert problem. Because when these quantum computers start coming out, you’ll be able to go back and unencrypt all those old secrets.”

Applications

VIBE is not a solution. It is a cryptographic ingredient that can be embedded in your connected products, services and solutions, with applicability in virtually every industry.

Internet of Things
(Platform, Devices, Semiconductors)

Commonly devices rely on semiconductors as a part of their functionality and increasingly, these products are able to communicate with each other through the internet. There are very few security standards within the IoT and yet millions of devices are being deployed daily with no embedded security. Dated security approaches such as PKI are overly complex to set up and manage, are not secure enough and cannot scale. VIBE-protected devices, monitored through an IoT VIBE-protected platform scales easily and will provide you with global visibility of your assets.

Security Software as a Service
(SSaaS)

The combination of VIBE protected apps using a downloadable software secure element solves the SMB security challenge without the need and cost of deploying hardware secure elements.

Enterprise/Government Communications (email, VOIP, FTP, Collaboration)

Working closely with another partner, VIBE is deploying its technology on micro SD cards, creating an offering capable of securing any communications device (fixed or mobile). This quantum resistant service can replace TLS/SSL and SSH and facilitate secure email, VoIP, authentication, Blockchain and file sharing applications.

Mobile Communications/Blockchain

Mobile and Blockchain developers can deploy VIBE to secure authentication and key exchange requirements. Its certificate-less feature and peer-to- peer functionality make it a perfect security ingredient for e-banking solutions and so much more.

About Us

With decades of IT/Cyber experience, our leadership team is working to make VIBE the global standard for secure communications.

Bill Montgomery

Bill Montgomery

CEO

Bill is the visionary behind the development of VIBE. Bill is recognized globally as a cyber-security thought-leader bent on communicating the power of the company’s patented, proven cryptography. Bill is a passionate, natural team leader with infectious enthusiasm. He has a knack for discovering people, partners and technology that can leverage the power of VIBE, creating powerful, new solutions that secure our connected world.

Hisham Lamei

Hisham Lamei

COO

A visionary entrepreneur with long-standing practice and former senior manager with proven success within multinational enterprises. Track record in business setup, business restructuring and realignment as well as operations up-scaling. Hisham is a senior executive with 35+ years of experience in high tech industries, spanning ICT, security and semiconductor technologies, business process transformation, digitization as well as cloud based solutions and services.

Mike Larkin

Mike Larkin

Chief Marketing Officer

Mike is a highly diverse leader with a background that includes everything from running a $1.6B telecom business unit, to being at the forefront of myriad emerging technologies, ranging from early days e-mail and v-mail to the dawn of the Internet. Mike sees VIBE as the “next big thing” and to that end has shaped the social media campaign that has imprinted VIBE in the minds of thousands worldwide.

Olivier Rouit

Olivier Rouit

CTO Embedded Security

Olivier has an extensive background in digital security. Our go-to team leader for all things embedded, Olivier has a deep understanding of VIBE, and he knows how to explain it in a way that is consistently creating “Ah-Ha” moments within our rapidly growing partner community.

Chuck Brooks

Chuck Brooks

Advisor

Named Top Person To Follow on Tech by LinkedIn. Cybersecurity Marketer of the Year 2016 and 2017. Former Adjunct Faculty Johns Hopkins University. Advisor, Bill & Melinda Gates Foundation.

Alfred Berkeley

Alfred Berkeley

Advisor

A former President of NASDAQ. Director of The World Economic Forum USA. Former trustee of the mathematical sciences research institute and served on the International Advisory Council for the Monetary Authority of Singapore.

Bob Bergman

Bob Bergman

IoT Standard Strategy

Bob was with Intel for almost 28 years, driving strategy for mobile phone and machine to machine (IoT) application standards. He was on the Board of Directors of Open Mobile Alliance and GSM Association and was a member of the Steering Committee of oneM2M.org. Bob has a total of 45 years of experience in software engineering, decision science, simulation, defense, process control, telecommunications, market research and strategic planning.

Paul Hager

Paul Hager

Advisor

Paul Hager has had proven success helping companies achieve strategic growth through innovative products, operations, and partnerships. He has also been instrumental in implementing organic and acquisition growth strategies for companies in clean energy, technology development, consumer products, and manufacturing.

As an entrepreneur and seasoned business leader, Paul has learned that the competitive edge is temporal, fragile, and fleeting. With his early career focus on corporate finance and technology development, he now enjoys helping companies build successful partnerships to accelerate growth across global markets in Asia, Europe, Americas, and Middle East.

EVENTS

GRACE: Graceful Remediation with Authenticated Certificateless Encryption

Contact

Let’s start a conversation. Please complete this short form and send us a message.

Twitter
LinkedIn

Real Time Web Analytics