You are on page 1of 2

Guardtime.

Write introduction , generation , private key /public key . which algorithm they are using. Explain
about Guardtime briefly.
Please explain all these points for Guardtime. its my project i need it urgently and briefly explained.
ANSWR:
Introduction:

Guardtime turned into based with a undertaking to make the global`s facts universally reliable, with out reliance at the
dangers of human accept as true with. Our invention, KSI, turned into at first designed
to guide the Estonian Government in its quest for zero-accept as true with structures i.e. structures that could offer
officially verifiable mathematical evidence of the correctness of operations.
The price to the worldwide economic system of handling human accept as true with may be measured withinside the
trillions of greenbacks in step with year.
A complete variety of enterprise capabilities (audit, compliance, cybersecurity, inspection, certification)
exist that attempt to slim the uncertainty related to trusting others. However, they fail, with growing price.
Our imaginative and prescient is a global in which those capabilities now not exist as
they're cryptographically encoded into the layout of applications.

Generation:

Guardtime has signed a contract to develop a highly automated NATO cyber range planning and control platform.
This significantly reduces the effort required to prepare and perform cyber exercises, training, testing, and
certification. Andri Rebane, Director of Cyber Policy, Ministry of Defense of Estonia:
"NATO Cyber Range is run by the Estonian Defense Forces, enabling the largest joint international exercises and
providing cyber training to experts in Estonia, its allies and partners, In turn, it ensures better preparation for cyber
attacks, thereby improving our own cyber deterrence and the capabilities of our allies.
"Guardtime, the culmination of years of preparation and development work, has helped take NATO's cyber range
automation to the next level, with less resources, better realism, and much more complex and extensive exercises.
NATO Cyber Range is one of the most capable cyber training environments in the world today. In addition to the day-
to-day operations that support the development of the Alliance's cyber capabilities, it hosts the world's largest and
most demanding multinational livefire cyber exercises, NATO's Cyber Alliance and CCD COE's Lockshield. In 2019,
more than 4,000 virtualization systems participated and have been exposed to more than 2,500 cyberattacks in its
history. Mike Vault, CEO of
Guardtime, said:
“We are excited about the maturity of our cyber range business. Over the last two years, we have conducted
numerous large-scale cyber exercises in the fields of energy, finance and defense, and have received general
acclaim from our customers. In terms of scenario sophistication, scope and execution quality, we believe there is
nothing comparable available in the world today. Cyber training and exercises represent a major growth area in the
world economy and we look forward to invest further in this business in partnership with defense contractors and
leading cybersecurity organizations."

Public/ Private key:

Since current policy and industry best practices require a SmartCard for authentication and authorization, developing
new authentication and authorization schemes that use true MultiFactor Authentication is not possible. SmartCards
can only provide “something you have” (Card / Private Key) and “Something you Know” (PIN). Due to their form
factor, SmartCards cannot provide multifactor authentication schemes that implement biometrics, location, proximity
etc. The DoD has struggled to find the best way to integrate smart ID cards with Government Furnished Equipment
(GFE) like smart phones. We propose a way to avoid the use of a smart card but allow a mobile device to
authenticate a user based on a multiplicity of factors. Biometrics on mobile devices Credentials associated with the
PUF-generated key Can be used as a multi-factor authentication mechanism Authenticate the target user as an
administrator / On the device. Biometric access data is executed Via feature extractor and biometric template file I'm
slipping. Distinguish between the two situations. In one
In the first situation, biometrics will be performed On the server. Next, with the biometric template file The associated
device ID is securely stored in your ledger Registering. The second method is Biometrics locally on the device without
Save the template file to your ledger. Depending on Footprint of IoT end devices that devices can verify locally Get
biometric credentials and use the result to unlock Symmetric PUF key.

Step 1
Generate a PUF Symmetric Enrollment Key (K) using
IntrinsicID`s key generator [SSFP]. The SRAM PUF
response along with internally generated random data will
be used to derive Helper Data. Helper Data is nonsensitive public data that is used by the Fuzzy Extractor to
correct noisy PUF bits and extract the same cryptographic
key every time. The Helper Data will be stored close to
the end IoT device for retrieval during the reconstruction
phase.

Step 2
This symmetric enrollment key will be run through a PRNG
to derive an asymmetric public/private key pair (PK, SK). The public key (PK) is stored on the ledger.

Step 3
Create a data structure (PK, EK(B), DID, H(PK), A )
whereby:
• PK is the SRAM PUF based public key
• EK(B) is the encryption of the extracted
biometric template file (B) with the
symmetric enrollment key (K),
• DID is a device ID1 (to associate
the biometric data with)
• H(PK) is the hash (H) of PK, it is used as a
unique fingerprintID for ledger lookup
• A stands for any other deterministic attributes.

Guardtime has been building a distributed zero trust system for 13 years. Our KSI technology is manufactured and
used by governments and businesses around the world.
The Guardtime KSI platform for building zero trust applications is a full stack platform that adheres to the Unix
philosophy of functional abstraction and layer encapsulation, each doing one thing well. Efficient disassembly
features guarantee scalability. Settlement time does not change with the number of transactions, and the marginal
cost of transactions (in terms of storage, network, or computing power) decreases as the number of transactions per
unit time increases This enables federated, complex multiparty processes that scale easily to the millions of
transactions per second

Guardtime's mission is to bring transparency to the world's information. US President Barack Obama recently said
that 100% security, 100% privacy, and zero inconvenience are not possible.
I agree with the guard time. However, we are 100% transparent and accountable across all networks to all citizens
and their respective government agencies that serve and protect them.

You might also like