Objective The DCM (Distributed Crypto Module) is a unique security system that provides a significant boost in server-side security, which will benefit almost every organisation today. The technology relies on a novel approach to protect cryptographic keys and authentication credentials that form the backbone of network and data security. Currently, the cryptographic keys and authentication credentials that reside on servers inside networks constitute single points of failure: it suffices for the attacker to obtain them and all is lost. This is due to the fact that all cryptographic techniques rely on the secrecy of the key; if the key is compromised then all is lost. Indeed, cryptography is rarely broken (even by the NSA); rather, it is bypassed by stealing the key! Server breaches are ubiquitous today and novel defenses are an acute need today in industry and government. In the DCM, the key is first split and shared amongst two or more servers (using known secret sharing technology) and then using our novel approach, the cryptographic operations necessary are carried out without bringing the parts of the secret together. Rather, the servers run a secure protocol, based on secure multiparty computation, which has the security guarantee that even if an attacker breaks into all but one of the servers, and can run any malicious code that it wishes, it still cannot learn anything about the secret key or credential. By configuring the DCM servers independently (different OS, different admins, different defenses, etc.), a very high level of security is achieved. The scope of the Proof of Concept DCM encapsulates the steps need to bring this groundbreaking technology to the market. A full business plan and market survey will be developed for the construction of a new company that will develop the DCM application and bring it to market. The first full version of a DCM will be ready for market a year after the company has been established (with limited versions earlier). Fields of science natural sciencescomputer and information sciencescomputer securitydata protectionnatural sciencescomputer and information sciencescomputer securitycryptographysocial scienceseconomics and businessbusiness and managementcommerce Keywords computer security cryptography Programme(s) H2020-EU.1.1. - EXCELLENT SCIENCE - European Research Council (ERC) Main Programme Topic(s) ERC-PoC-2014 - ERC Proof of Concept Grant Call for proposal ERC-2014-PoC See other projects for this call Funding Scheme ERC-POC - Proof of Concept Grant Coordinator BAR ILAN UNIVERSITY Net EU contribution € 149 776,00 Address Bar ilan university campus 52900 Ramat gan Israel See on map Activity type Higher or Secondary Education Establishments Links Contact the organisation Opens in new window Website Opens in new window Participation in EU R&I programmes Opens in new window HORIZON collaboration network Opens in new window Other funding € 0,00 Beneficiaries (1) Sort alphabetically Sort by Net EU contribution Expand all Collapse all BAR ILAN UNIVERSITY Israel Net EU contribution € 149 776,00 Address Bar ilan university campus 52900 Ramat gan See on map Activity type Higher or Secondary Education Establishments Links Contact the organisation Opens in new window Website Opens in new window Participation in EU R&I programmes Opens in new window HORIZON collaboration network Opens in new window Other funding € 0,00