Security is critical: we want to rely only on ourselves
The idea of having to rely entirely on some external entity, that maintains a somewhat mysterious "security structure", and is the only one to have complete access to your company's data, certainly looks uncomfortable. But this is in no way an inevitable consequence of external consulting, and definitely not the way we work.
Our policy is to collaborate in an as transparent manner as possible. We will provide you with as much technical details about your system as you will want to hear, and transfer control to you in as much as you want.
To take a simple example, the aforementioned Kerckhoffs' assumption pleads for a clear separation between cryptographic functions and keys, with the latter gathering all the secrecy required for protection. During development, we clearly point the places were keys are used. Before deployment, you decide whether you want us to keep these keys, acting as a backup, or you prefer to replace them by your own, hence becoming the one and only to have access to your data.
And if you want to be sure there is no inserted backdoor, you can also have the software developed by your own programmers' team, with our support for global architecture design and technical assistance. Or you can have the product audited by a third party.
Secure Hash Standard (SHS)
SHA-1 Broken: Collision Attack Found, Implications for Cryptography
NIST is issuing a tentative agenda for the development of a SHA successor
Does the proof of the Riemann hypothesis really bring the whole of ecommerce to its knees?
The Cost of Insecurity: Understanding the “Non-Loss” Benefit of Cryptography
The Cost of “Just Enough” Security: Why Good Cryptography isn’t More Expensive
Cryptographer Consulting: Security Transparency vs. Relying on Ourselves
Why do people believe they should handle cryptography themselves?
The Illusion of Simplicity: Why Designing Your Own Cryptography Fails
Why Do I Need a Cryptographer?
Founding Members
Academic and Historical References
What Is Our Methodology?
Security Courses, Cryptography Consulting, System Evaluation & TTP Services
Bridging The Gap Between Scientific Research And Industry Needs