
AUGMENTED PKI
Quantum Computing poses a threat to the foundation of encryption, Public Key Infrastructure, or PKI. In response, Orex Research has developed a new level of proprietary encryption known as Augmented PKI.
​​
Augmented PKI obscures critical metadata from encrypted packets, eliminating necessary information that quantum processors require to ​succeed. Orex Research Augmented PKI stands to usher in a renaissance in data encryption and sharing.
AUGMENTED PKI / DRONES / CLOUD SECURITY / SECURE COMMUNICATIONS / ENCRYPTION & EMPSECURE
AUGMENTED PKI IN STREAMING COMMUNICATION
Introduction
Streaming communications for video and audio communications tend to be encrypted with a one time key for the duration of the session. The major weakness in this approach is that the session maybe collected and stored for a brute force approach to decrypt at a later date.
An approach using Augmented PKI can be used to make this approach between very difficult to near impossible in any current time frame.
This approach can be used in data communications between devices as well as audio or video communications across the internet.
The Augmented PKI Communications Approach
To start the communications between devices or users the following approach is taken:
-
Device or user initiates communications by sending a standard PKI packet with the initiation message
-
The receiving end responds with an accepted authentication message. This now establishes communications.
-
Each end of the communications stream now sends an augmented PKI packet with no information except the addition augmented key.
-
Once this is established 2 subsequent Augmented PKI packets are exchanged. These packets contain dummy data and are used to establish the Augmented PKI exchange.
-
The file contains a randomly selected key to be used in a symmetrical key encryption process and the length of time in that session that they key will be used until is rolled over to the next key.
-
The communications are asymmetrical and each device or user has their own code files and there is no relationship with the keys used in the send and receive.
This system uses the strength of Augmented PKI to establish device or user communications and to exchange a one time set of keys and key duration period between devices or users. As each device or user generates a one time key set for the duration of the session there is no relationship between the keys used or the duration of each key between the downstream or upstream communications.
The rolling keys make it extremely difficult to decrypt the communications session and the random time for the use of each random key further complicates the process of any post event attempt to decrypt the session.
THE OREX AUGMENTED PKI PROCESS
The proprietary Augmented PKI Process by Orex Research removes key metadata from the encryption and decryption process that is required by quantum computing systems to break encoded information and arrive at the correct answer.
​
The two charts following here show the standard PKI Encryption Process and the Augmented PKI Process:
The Standard PKI Process for Securing a Message

The Orex Augmented PKI Process for Securing a Message

For more information on this proprietary process and to see how it can protect your company's data, contact Orex Research at: info@orexresearch.com