Explore the words cloud of the CIPHRA project. It provides you a very rough idea of what is the project "CIPHRA" about.
The following table provides information about the project.
Coordinator |
AUTHENTICO TECHNOLOGIES AB
Organization address contact info |
Coordinator Country | Sweden [SE] |
Total cost | 71˙429 € |
EC max contribution | 50˙000 € (70%) |
Programme |
1. H2020-EU.3. (PRIORITY 'Societal challenges) 2. H2020-EU.2.3. (INDUSTRIAL LEADERSHIP - Innovation In SMEs) 3. H2020-EU.2.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies) |
Code Call | H2020-SMEInst-2018-2020-1 |
Funding Scheme | SME-1 |
Starting year | 2020 |
Duration (year-month-day) | from 2020-01-01 to 2020-06-30 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | AUTHENTICO TECHNOLOGIES AB | SE (GOTEBORG) | coordinator | 50˙000.00 |
The story of data breaches across industries with national, regional, and often global impact is a never-ending one. The exposure of huge amounts of personal information and identities continues to be a major problem without a solution in sight (see sample on the left of recent breaches to tech giants). At the nexus of the world of cyber security and cyber-crime is the paramount issue of password and encryption key storage – the security measures in place to prevent hacking, and the capabilities of the illegal hackers to hack into storage sites and decipher encrypted messages.Authentico has invented CIPHRA which is a hardware dependent cryptographic processor that ensures that passwords and encryption keys are essentially impossible to steal even if a database is hacked into. CIPHRA protects the cryptographic infrastructure by securely processing passwords, and generating unclonable encryption keys from authentication requests using a technology called PUF (physically unclonable functions). Authentico´s solution stands to be a major alternative to traditional key storage methods. The keys are always present in the device, by generating the key on request. Information, such as password hashes, can be inputted, but never read out or extracted. Even weak passwords cannot be broken because the generated outputs are useless for an attacker and the database of encrypted and hashed passwords is useless without the key. This is a far better solution than current approaches because the company’s secret keys are never stored anywhere, at any time, making it extremely difficult for any malicious insider or outside hacker to ever gain access to them.
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "CIPHRA" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "CIPHRA" are provided by the European Opendata Portal: CORDIS opendata.