Pantherun is an Indian cyber security innovator that has developed a patented data protection algorithm to transforms security for data throughputs of up to 10 Gbps, using an implementation of AES encryption in real-time that eliminates the vulnerabilities associated with key exchanges. This is ideally suited to work both on Edge devices as well as on the cloud.
What is unique and why is it difficult to breach
Unlike methods like SSL/TLS, IPSec, MACSec and their adaptations to vertical segments that are prevalent today, the Pantherun encryption, based on the Industry standard AES, makes no change in data format and requires no clear-text handshaking exchanges to communicate keys or encryption methodology, thus providing no clues to listeners on the network on what type of encryption such as AES/RC4 is used, how many bits length of key (128/256) or even (384/512 for post-quantum protection) is used, or the method by which the key is generated. As there is no need for key exchanges of any kind, this makes breaches harder due to the complete lack of clues to the listener.
This is enabled using an AI defined key generation process, where a key is computed for every transmission between a particular source and destination, based on running a statistical correlation algorithm that finds a unique FIPS compliant key from 65K bytes of past data exchanged between them. Thus a unique key, specific to each packet between a source and destination, is used to encrypt packets. This algorithm running on the same 65K set of past data on both the source and destination, independently generates a unique key at both ends, that is then used in the source to encrypt data and in the destination to decrypt data.
Pantherun provides this technology both as Verilog IP that can go into silicon or FPGAs, as well as a minimal code software library that can go into products running Windows, Linux, Android, iOS or RTOS.
Industry
Computer and Network Security
HQ Location
#311, 6th Main, HAL 2nd Stage, Indiranagar,
Bengaluru, Karnataka 560038, IN
Keywords
NetworkingCybersecurityData protectionand Industrial and IOT