Quarks Keys Protect
Hiding cryptographic keys in software
Unprotected keys can be quickly found even by unskilled attackers through visual inspections of a binary. If a software or device can be accessed by an attacker, either remotely or locally, white-box cryptography is to be considered to protect your cryptographic keys and ensure a safe usage of your application and data.
Support of the most popular cryptographic algorithms
Our product offers white-box implementations of the most common cryptographic algorithms available on the market, fitting specific use cases in entertainement and mobile payment market segments.
Unique white-box implementations
Quarks Keys Protect has been developed with a special white-box generation technology: with this design, each implementation is unique and not shared among customers.
Quarks Keys Protect is audited on a regular basis and has been found resistant against known side-channel attacks on white-box cryptography (BGE,DCA,DFA…)
|Quarks Keys Protect|
|Protection mode||Static and dynamic|
Symmetric encryption: AES128 with ECB/CBC/CTR modes
Asymmetric encryption: ElGamal on the NIST P-256 curve
Hash functions: SHA-1/SHA-256
Symmetric Authentication: AES-CMAC
Signature: ECDSA-SHA-256 on the NIST P-256 curve
Diversification per client or per device
Full control on the (re)generation of your whitebox
|Operating systems||Linux, Windows, OS X, Android, iOS|
|Architecture||x86, x86_64, ARM, ARM64|
|IDE integration||Apple XCode, Microsoft Visual Studio, & Google Android NDK|
|Sec/Dev/Ops (CI/CD Integrations)||Gitlab, Jenkins|
Reach out to our team for a product demonstration
Payment systems are at the heart of the global economy. Over the past few decades, electronic payments have grown at a fast pace, supplanting traditional payment systems such as cheques and cash to become the current standard. These systems have evolved over the...
The streaming video market is estimated to reach 110 billion euros by 2024, with an average annual growth of almost 20%. Boosted by mobile devices, ever more powerful 4G and soon 5G connections, online video consumption is here to stay. Viaccess-Orca (VO) is one of...
Discover in the infographics below how mobile payment works and what are the risks and threats with the development of payments from mobile platforms. See the infographics: https://bit.ly/3oIhyAO