About our technology

The science behind Symmetrikey and Authentikey.

securing systems in a quantum world

Quantum computers are likely to be with us in a decade or less – and they present major challenges for security professionals.

Verifying human and machine identities

Many of the encryption methods used to secure authentication protocols will be rendered obsolete by quantum computers – while the methods themselves remain vulnerable to social engineering attacks from fraudsters, which are increasing in complexity. This is true of authentication systems that use SMS, WhatsApp, email, and social media. Even biometrics are expected to come under threat from AI-driven scams.

To neutralise these threats, an authentication protocol needs to be protected against quantum attack, to regularly re-authenticate against a fresh root of trust, and provide compromise detection to enable swift identification and remediation of breaches.

Protecting data at rest and in transit

Q-Day makes any data encrypted using traditional asymmetric encryption vulnerable. Even today, criminals are stealing data to be decrypted once quantum computing becomes available, known as Hack Now, Decrypt Later attacks. These threats are forcing governments to set standards and legislate for quantum-safe encryption now.

Existing quantum-safe encryption methods fall into two categories:

Quantum Key Distribution (QKD) is highly secure, but impractical over long distances or at scale due to its physical nature and cost.

Post-Quantum Cryptography (PQC) offers quantum-safe security that’s more scalable than QKD, but many current implementations suffer from excessive complexity and computational load.

How Cavero Quantum solves the challenge

Authentikey

Symmetrikey

Discover the science behind Cavero Technology

Though based on established principles, Symmetrikey combines those principles in novel ways to produce security. Click below to request our scientific paper explaining the detail of how Symmetrikey works.

How does Authentikey work?

From an initial root of trust which you choose, Authentikey uses key exchange to create a shared ledger of interactions that is used to validate both parties in the authentication.

In subsequent exchanges, the key ledger is used in place of the initial root of trust to authenticate the exchange, and a new key is generated and added to the shared ledger.

Because Authentikey uses the key ledger to reauthenticate instead of the initial root of trust, it protects against Authentication decay – and as long as the keys used are quantum safe keys like Symmetrikey, the authentiation is quantum safe, too. 

How does Symmetrikey work?

Symmetrikey uses Ring Learning With Errors (RLWE) as the basis of security. RLWE is similar to the well-known PQC problem, Learning with Errors (LWE), done over a polynomial ring.

A variant of LWE is also used by the NIST-approved ML-KEM and ML-DSA protocols, meaning that Symmetrikey is based on proven mathematical problems. To date, no computational shortcuts have been found for RLWE, making it a quantum-safe PQC problem.

In addition to RLWE, Symmetrikey uses correlation filtering. Correlation filtering is a technique borrowed from QKD that enables each party to generate identical keys without having to transmit anything over a public channel that could enable an attacker to guess or compute the key.

Want To Know More About Symmetrikey?

If you’d like to understand more about how Symmetrikey works, we have a scientific paper and a business-focused white paper available upon request. Fill in the form below and we’ll be in touch.