MultiParty Protocol (MPP) –
eliminating single point of failure

MultiParty Protocol (MPP) is a protocol designed to establish secure multi-party connection between authenticated entities. These connected entities are equipped to make distributed computations (MPC) to form multi-party decisions - thereby creating a consensus.

MPP is XXLSEC proprietary multiparty consensus protocol designed to deliver information securely between parties.

It is designed to upgrade the traditional centralised security models (CA + Certificates).

MPP is an essential technology to secure communication with easier and more cost effective solutions than what is available in the market by PKI, VPN and IPsec based offerings.

XXLSEC MPP is compliant with NIST8214A standard draft "Towards NIST Standards for Threshold Schemes for Cryptographic Primitives" and NIST800-207 "Zero Trust Architecture".

What is MultiParty Computation (MPC) -
how leading analysts define?

"The ability of multiple parties to jointly perform mathematical computations without any party revealing its secrets to the others. MPC-based solutions offer new methods to ensure scalable, private and secure data processing and sharing."

Identity and authentication

MPP facilitates the sharing of ‘consensus’ between multiple parties without exposing any sensitive data. There is no centralized trust element – or back-end systems potentially creating exposure to security risks. MPP facilitates the consensus between identities which are distributed between the nodes in the constellation.

Encryption keys you can not steal

MPP offers an efficient method to handle encryption keys. The technology provides a shared consensus about keys and provides an efficient revocation and new node joining process. None of the nodes in a constellation contains the complete key - but only a share of the key. Therefore replacing a node even in an untrusted environment will not compromise security. Keys are never combined as whole.

MPP offers secure key exchange in both layer 3 solutions and also in layer 2, MACSec key exchange. MPP enables no more centralized key servers but dispersed security and keys you can not steal. With MPC driven MPP, encryption keys are never clear text and whole in any location.

Decentralised multipoint connectivity

Whilst current secure connectivity technologies support only point-to-point connectivity between only two nodes, MPP is a multipoint security protocol. It shares the consensus between all parties in a constellation, without the need to centrally authorize, sign or distribute the permissions of the relevant parties.

Protected IP traffic

Currently available protocols and technologies like TLS, OpenSLL, VPN expose identities between communicating parties and reveal the key exchange information as clear text on the communication line. MPP, however, has the added benefit that it secures this critically important information. Only structured random text is visible.

All in one solution

MultiParty Protocol (MPP) delivers multi-dimensional zero trust capable security
→ Integrity: information is valid
→ Authentication: proof of identity

→ Confidentiality: data encryption

MPP – a comprehensive security solution

The technology requirements of the new 5G and IoT world, and the adoption of Zero Trust strategy, have prompted a significant R&D investment globally to find a solution. Multiple efforts and “innovations” have failed the test.

MPP protocol supports mainline hardware architectures, internet protocols, message systems, network topologies, bandwith requirements, multipoint connectivity and multicast transmission.

MPP enables that encryption keys are never clear text in any situation.

MPP solution supports IoT-systems like low capacity sensors with MQTT messaging protocol and many other combinations. MPP is equally suitable sub 1ms real time multicast systems in the 5G environment.

Large scale IoT systems and 5G connectivity

5G networks are particularly well suited to serve connected low latency high data speed systems, like vehicles, critical medical systems, cloud and drone swarms, which are often automated or driven by artificial intelligence. Network slicing and multicast capabilities are recognized as important 5G features in critical communication environments.

The question is how to do authentication and encryption when the number of sensors can be millions and millions, and they need to have same shared information available with sub1ms requirement. There is simply no time to do the session key exchange millions of times between multiple sensors and authentication protocols – PKI and IPSec based solutions are not designed for this context.

Zero Trust requires authenticating all elements which have access to the underlying data – and secure connections have to be formed between multiple parties in real time. Same real time IoT systems require also multicast capable traffic. One node in the system will send information and multiple parties will receive it.

Real time encrypted connections between multiple authenticated parties are vital – these can be effectively delivered by the MPP protocol.