Cipher Box M
Cipher Box M uses multiparty IDC-protocol to distribute the identities of a constellation in a defined network. There are no centralized services and no risk for the network participants if a device is lost.
Cipher Box M is ideally suited for secure tunnels in multipoint networks. There are no complications stemming from centralized servers or heavy duty security key management. All users are connected and encrypted without PKI mechanism.
As is the case with all PKI based secure connections, VPN connections are difficult to implement in scale. Cipher Box M uses the IDC-protocol to create secured tunnels with significant scale benefits for easier and faster implementation.
Cipher Box M is equipped with both physical and software level protection in case the device is lost. Physical lock and multiparty based secret sharing ensure that all critical communication secrets stay in the user’s exclusive posession.
If any of the Cipher Boxes in a constellation is lost, it can be separated and isolated immediately from the trusted constellation using the IDC-protocol revocation mechanism.
Dynamic trust anchor
Implements dynamic user controlled trust anchor in zero trust environment.
Low latency compatible for 5G networks
Cipher Box M is designed for connections and communication requiring sub 1ms response. This is vitally important in 5G networks and all critical real time response applications.
Cipher Box M is equipped to offer multi-layer security. Payload can be sliced to deliver a communication in different layers and in different networks. This is a fundamentally important feature to meet 5G slicing recuirements.
Meta data protection
For enhanced security, the payload traffic does not include clear text identities or used security parameters – but only random traffic.
Cipher Box M is capable of delivering encrypted multicast payload with none or minimal latency depending on network quality – which may be needed for broadcasting purposes, and for certain real time voice communication like Push-To-Talk (PTT) and applications.
Solution example 1:
Global enterprise wants to establish secure connectivity between its global HQ and its other operating sites and factories. Cipher Boxes are deployed globally to create a distinct security layer fully and exclusively controlled by the user. All connections are now secured and updated with the IDC-protocol. This represents a major security enhancement with reduced risks and it creates better resiliency for all business critical operations.
Solution example 2:
Enterprise IT-system for a global professional services firm includes end devices, servers and sensors which carry sensitive operating and client information. Cipher Boxes are deployed to create a secure authentication platform to cover all critical communications and systems. Added with fast and easy revocation and new peer installation capability, security risks are significantly diminished. Moreover efforts and related costs of system administration are reduced.
Cipher Box M technical features
|Case||Aluminium with a physical lock|
|Display||None – browser based UI|
|Processor||A9 NXP iMX6|
|Memory||2 GB RAM, 8 GB|
|Connectivity||10/100 Mbit/s RJ45
|Manufactured||Finland by XXLSEC|