Cryptographic Research and Development
Custom Cryptography Solutions: From Algorithm Design to System Integration
Cryptographic Research & Development
Cryptography, literally meaning “the science of secret knowledge,” has been captivating minds since ancient Rome. Today, it stands as a shared domain within Computer Science and Mathematics. While the invention of silicon chips made many existing ciphers vulnerable to cracking, the increasing clock frequencies and prime numbers driven by Moore’s Law fueled the development of secure encryption methods. The advent of quantum computers in recent years, along with numerous scientific breakthroughs, has brought Physics into the equation, revealing that many algorithms are inherently insecure.
Our team is led by Dr. Metin Evrim Ulu. In 2020, he contributed to TUBITAK 2232 Quantum Simulator Project led by Prof. Dr. Çetin Kaya Koç, playing a role in designing Turkey’s first Quantum Simulator.
Although most institutions face accessibility issues regarding Quantum Computing and Algorithms, the potential threat of quantum attacks on existing ciphers has spurred the development of post-quantum cryptography (PQC). These algorithms are designed to maintain security even in the presence of quantum computers, and their implementation is rapidly expanding. We at Kor Bilişim Ltd., are proud to possess expertise and experience in this crucial field.
Applications
Our research and development efforts can offer various potential benefits to your company or project. Here are a few examples:
- Unique Block Ciphers:
- Can be applied as file system encryption, for example, ZFS.
- Novel Stream Ciphers:
- Can be used as VPN encryption, for example, Wireguard,
- Can be used as OpenSSH encryption, for example, OpenSSH.
- GNU/Linux Security Enhancements:
- Encrypting and integrity checking the kernel on disk,
- Encrypting and integrity checking the initrd on disk.
These and similar enhancements can help mitigate some of today’s common attack types. For instance, they can prevent eavesdropping on your communications through generic tools that are unaware of your algorithms. Additionally, it might be possible to partially protect the integrity of critical files stored on the system disk.
Feel free to contact us for more information – we look forward to connecting!