EviCypher is a product that simultaneously offers two types of protection and security, one is physical and the other is digital.
EviCypher is an NFC Air Gap device that only connects on demand to computer systems via an NFC phone using as a terminal. Secrets stored in EviCypher’s secure non-volatile memories are end-to-end encrypted from the device. Otherwise, EviCypher is a passive product. It needs the NFC signal sent by an NFC phone it is paired with to become active.
In fact, this excludes any form of remote cyber attack.
EviCypher is designed to resist invasive and non-invasive attacks as well. Indeed, the secrets stored in the eprom memories are encrypted in AES 256 with segmented keys of physical origin. Up to 9 different cumulative trust criteria can be added for each stored secret. These are in addition to the 4 other native physical trust criteria such as the pairing key, the anti-forgery signature, the password defined by the administrator of EviCypher.
EviCypher also offers the user the possibility of adding up to 5 cumulative trust criteria of non-modifiable physical origin to exchange secrets encrypted with the public key RSA 4096 of another EviCypher. This makes it possible to impose the conditions of access to a shared secret. All the trust criteria must be met to authorize access to secrets and their use. For this, EviCypher also embeds a generator with auto backup of RSA 4096 keys. The private keys are also encrypted in the device in AES 256 by segmented keys with addition of confidence criteria of physical origin.
The public keys of the RSA keys are used to exchange secrets in an encrypted manner between 2 EviCypher devices. Exchanges can be carried out by any means of communication. They can also be printed. Finally, they can be shared in real time by QR Code display between phones, or contactless via the Beam NFC Android function.
EviCypher is an easy-to-use tool, with individual sovereignty, capable of effectively resisting any attempt to corrupt your secrets. This is fundamental to increase tolerance to attacks. It is also a system that keeps a set of crucial features functioning well despite malicious behavior.