Cipher Box M


Identity management

Cipher Box M uses multiparty IDC-protocol to distribute the identities of a constellation in a defined network. There are no centralized services and no risk for the network participants if a device is lost.

Multipoint security

Cipher Box M is ideally suited for secure tunnels in multipoint networks. There are no complications stemming from centralized servers or heavy duty security key management. All users are connected and encrypted without PKI mechanism.


Scaling benefits

As is the case with all PKI based secure connections, VPN connections are difficult to implement in scale. Cipher Box M uses the IDC-protocol to create secured tunnels with significant scale benefits for easier and faster implementation.


Forensic security

Cipher Box M is equipped with both physical and software level protection in case the device is lost. Physical lock and multiparty based secret sharing ensure that all critical communication secrets stay in the user’s exclusive posession.

  • Immediate revocation

    If any of the Cipher Boxes in a constellation is lost, it can be separated and isolated immediately from the trusted constellation using the IDC-protocol revocation mechanism.

  • Dynamic trust anchor

    Implements dynamic user controlled trust anchor in zero trust environment.

  • Low latency compatible for 5G networks

    Cipher Box M is designed for connections and communication requiring sub 1ms response. This is vitally important in 5G networks and all critical real time response applications.

  • Multi-layer security

    Cipher Box M is equipped to offer multi-layer security. Payload can be sliced to deliver a communication in different layers and in different networks. This is a fundamentally important feature to meet 5G slicing recuirements.

  • Meta data protection

    For enhanced security, the payload traffic does not include clear text identities or used security parameters – but only random traffic.

  • Multicast traffic

    Cipher Box M is capable of delivering encrypted multicast payload with none or minimal latency depending on network quality – which may be needed for broadcasting purposes, and for certain real time voice communication like Push-To-Talk (PTT) and applications.

Solution example 1:
Global enterprise

Global enterprise wants to establish secure connectivity between its global HQ and its other operating sites and factories. Cipher Boxes are deployed globally to create a distinct security layer fully and exclusively controlled by the user. All connections are now secured and updated with the IDC-protocol. This represents a major security enhancement with reduced risks and it creates better resiliency for all business critical operations.

Solution example 2:
IoT authentication

Enterprise IT-system for a global professional services firm includes end devices, servers and sensors which carry sensitive operating and client information. Cipher Boxes are deployed to create a secure authentication platform to cover all critical communications and systems. Added with fast and easy revocation and new peer installation capability, security risks are significantly diminished. Moreover efforts and related costs of system administration are reduced.

 

Cipher Box M technical features

Size 90x142x42 mm
Case Aluminium with a physical lock
Display None – browser based UI
Processor A9 NXP iMX6
Memory 2 GB RAM, 8 GB
Connectivity 10/100 Mbit/s RJ45
2*usb, 1*HDMI
Audio 3,5mm
Buttons None
Operating System PriveOS
Manufactured Finland by XXLSEC
Image