Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

New protocol from Guardtime hopes to unseat RSA for authentication, digital signatures

Tim Greene | May 22, 2015
BLT protocol promises tighter security, easier management.

Data integrity vendor Guardtime hopes its newly announced protocol will replace RSA for the purposes of authentication and digital signatures, touting it as easier to manage and less vulnerable to hacking.

Called BLT, the protocol name comes from the last initials of its inventors, Ahto Buldas, Risto Laanoja and Ahto Truu, just as RSA comes from the last initials of its inventors, Ron Rivest,  Adi Shamir and Leonard Adleman.

Rather than relying on public and private keys (PKI) as RSA does, BLT is based on hash-function cryptography, which requires no keys and so requires no issuing, updating or revoking of keys. As a result, it can scale to cover exabytes (1018 bytes) with little overhead, says the company's CEO Mike Gault. And there are no cryptographic secrets to be compromised.

In addition, the protocol, which is built on Guardtime's Keyless Signature Infrastructure (KSI) technology, invokes one-way hashes that cannot be broken, even under attack from the theoretical capabilities of quantum computers. The company points to its recently published mathematical proof of BLT's effectiveness to back up its claim with further proof here and here.

KSI is the technology on which the company bases Black Lantern system for ensuring the integrity of digital assets. It can be used to create a hashed signature of a digital asset when it is in a known good state. Based on constant monitoring of these time-stamped hashes, the system can verify that data, operating systems, applications and configurations have not been altered.

The hash signatures are reviewed every second, so any changes are caught almost immediately. The changes mean something about the asset itself has changed, and that might represent an attack that can then be checked out by third-party security platforms or security staff.

"That's the true value of it," says Phil Hochmuth, an analyst with Strategy Analytics. "It's a way to get rapid alert to a breach. It could be applied to the Internet of Things or any vastly distributed network."

Gartner Analyst Mary Ruddy says the distributed, scalable and light-weight nature of the system make it seem feasible for deploying on digital assets that it might otherwise not be economically viable to cover.

Like Bitcoin, Black Lantern uses an open-ledger system in which derived hash-value trees are maintained by Guardtime in order to monitor for changes. In the case of Bitcoin the values represent transactions; in the case of Guardtime, it's the hashed signatures of the assets being tracked.

Guardtime's technology also underpins a service being sold commercially by Ericsson that determines whether systems customers purchase have been altered after delivery, as well as to verify the integrity of operating systems, applications and configurations, says Jason Hoffman, head of technology and cloud systems for Ericsson.

 

1  2  Next Page 

Sign up for MIS Asia eNewsletters.