Skip to content
Draft
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
27 changes: 27 additions & 0 deletions content/services/cryptography-and-security.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
---
name: "Cryptography and security"
callToActionText: "CTAT"
---

## Cryptography: essential but challenging

Cryptography lies at the core of practically all modern day applications, guaranteeing the integrity and confidentiality of data, as well as the authentication of those accessing data and services. With the rise of coordinated industrial espionage by rivals, systematic hacking efforts by nation-state actors, and highly costly anonymous ransomware attacks; we increasingly depend on highly sophisticated cryptographic protocols to safeguard ourselves from these bad actors.

It is imperative then that the implementations we rely on are correctly used and bug-free, and that the protocols are appropriate and proved to be secure. Given the fragile nature and ease of misusing cryptography, even the most basic application of well known, standardised protocols is often difficult and requires an expert review to confirm the correct implementation.

When one ventures beyond the landscape of the ubiquitous and well studied protocols, the challenge of correctly using cryptography becomes orders of magnitude more difficult. Navigating the world of novel protocols, and understanding the strengths and weaknesses of different primitives is an extremely challenging endeavour.

## Security: the grand view

Security, although it involves a good dose of cryptography, involves more than the application, analysis, and application of protocols and primitives. Sophisticated security modelling and analysis is required to guarantee the safety of entire systems.

- Attack surface/vectors
- Threat model
- Risk assessment
- Human error
- Key management
- Whatever whatever whatever

### We can help

Whether you're trying to use TLSv1.3 for secure API calls or developing your own novel cryptocurrency, our team of experienced consultants can give you tailored aid in implementing and verifying your cryptographic needs. With deep knowledge of cryptographic environments and existing cryptosystems, and a thorough understanding of the individual primitives underpinning those systems, we can expedite your software delivery while simultaneously making sure the systems you rely on for business critical needs are safe and secure from prying eyes.