Good Contents Are Everywhere, But Here, We Deliver The Best of The Best.Please Hold on!
Your address will show here +12 34 56 78
Ideas on how best to protect cyber information belonging to individuals, organizations and governments are constantly evolving, with a mix of older and newer methods existing side-by-side. Passwords and keys are still widely used, as two-factor authentication also grows. Surprisingly few people, though, are talking about secret sharing, a security option that takes data and uses randomization to compute different numbers (shares) that only together define the secret/data. TechDigg spoke to Amit Rahav, VP Marketing & Business Development at Secret Double Octopus to find out more about secret sharing.

What exactly is secret sharing and how does it work?

The system that we use at Secret Double Octopus utilizes multiple security matches using multiple routes – based on “secret sharing”- an algorithm established in 1979 by cryptographers Adi Shamir and George Blakely. Secret sharing takes data and uses randomization to compute different numbers (shares) that only together define the secret/data, meaning it’s almost impossible for hackers to piece together.
Secret sharing is mathematically unbreakable, and is so strong in its inherent security methodology that it has been used to prevent accidental or malicious launch of nuclear weapons.

Why is it safer than other methods?

It’s safer because it’s information that’s theoretically secure. For example, there’s not enough information to solve A + B = 100. You’re presenting the hacker with a problem that they don’t have enough information to solve. This enables the implementation of multi-layer cyber security, where each hacking breakthrough merely yields a useless piece of information.
Secret sharing prevents accidental launch of nuclear weapons.
Secret sharing prevents accidental launch of nuclear weapons. Source: YouTube

Where was it used to help prevent accidental or malicious launch of nuclear weapons?

In secret sharing, a secret is transformed into several meaningless ‘shares’ where several – or all – of them are needed in order to reconstruct the secret. This mathematical concept is often used as a security measure taken to prevent single-person access to secured environments. For example, the US Air Force is operating under “The Two-Person Concept” directive which is designed to prevent accidental or malicious launch of nuclear weapons by a single individual.

Is the method expected to overtake others in the future?

We believe that single-point-of-failure security is a thing of the past. The only way to ensure long and everlasting security is by applying secret sharing-based security to Mobile cloud and Internet of Things (IoT) environments.

The end of the password?

The Secret Double Octopus website declares that “the password is dead.” The company believes that: “No password security means more protection, not less”, because “in the hands of users, passwords are a vulnerability”, and that “password-based security is a poor fit for fast-growing architectures, such as cloud, mobile, and IoT. There’s too much to remember – too much complication and exposure.” The alternative, they believe, is an “authentication wall is invisible to the user. There are security factors, but the user does not need to remember or operate” them. Instead, the company creates “a password-free environment with trust channels established via a mobile phone app.” It’s certainly true that passwords are far from ideal, and an eventual move away from them is almost inevitable. The use of secret sharing on a widespread basis, including by the majority of individuals, is a direction in which cyber-security could and perhaps should evolve.  
  Source: https://techdigg.com/2017/07/21/secret-sharing-protects-nuclear-weapons-and-could-replace-our-passwords/
0

Azlan strengthens security offering with specialist solution for keyless authentication technology Barcelona, Spain, 29 June 2017:

Tech Data Corporation (Nasdaq: TECD) today announced that Azlan, Tech Data Europe’s specialist brand for the value-added distribution of enterprise networking, server, storage and software solutions, today announced a pan-EMEA distribution agreement with  Secret Double Octopus, a pioneer of keyless multi-shield authentication technology.   Secret Double Octopus has developed a solution for the market that applies keyless authentication and identity protection for cloud, mobile, and IoT solutions.

Secret Double Octopus’ app helps companies to scale their network security and shift away from key-based authenticators, to a more secure keyless solution. With one tap, the authenticator app initiates a multi-shield authentication process for users in order to verify or reject the login attempt, payment or transaction. David Harvey, director, Security and Enterprise Networking Solutions at Azlan, says “By bringing Secret Double Octopus into our vendor portfolio, Azlan enriches its security offering with an innovative solution that addresses customers’ authentication challenges, is scalable and easy to deploy, and helps provide cost-effective security.” “For years, organizations have sought to educate employees about the importance of secure passwords and resisting phishing attacks, both of which have failed. It is time to replace the password.” said Raz Rafaeli, CEO of Secret Double Octopus. “We are excited to expand our global footprint through this partnership with Azlan. We can offer the European market a strong authentication solution that will eliminate the need for passwords – a security vulnerability that accounts for two-thirds of data breaches.”   About Tech Data Tech Data Corporation is one of the world’s largest wholesale distributors of technology products, services and solutions. Its advanced logistics capabilities and value-added services enable 115,000 resellers to efficiently and cost-effectively support the diverse technology needs of end users in more than 100 countries. Tech Data generated $26.2 billion in net sales for the fiscal year ended January 31, 2017. It is ranked No. 107 on the Fortune 500® and one of Fortune’s “World’s Most Admired Companies.” To learn more, visit www.techdata.com, or follow us on Facebook and Twitter.  About Secret Double Octopus Secret Double Octopus is the world’s only password-free, keyless authentication technology to protect identity and data across cloud, mobile and IoT environments. Based on Secret Sharing algorithms, originally developed to protect nuclear launch codes, Secret Double Octopus’ technology prevents cyber attackers from accessing enough critical information to be useful for attacks, eliminating brute force, man-in-the-middle, PKI manipulation, key theft and certificate authority weaknesses. The Company was founded in 2015 by a seasoned leadership team with more than 100 years combined academic and industry experience. Secret Double Octopus is backed by Jerusalem Venture Partners, Iris Capital, Liberty Media and Benhamou Global Ventures. To learn more, visit www.doubleoctopus.com, or follow us on Facebook and Twitter.   
Source: http://www.ts.avnet.com/emea/press_centre/press_centre_more/11680/tech_data_europe_announces_new_distribution_agreement_with_secret_double_octopus.html
0