Skip to main content

Public-Key Cryptography​

Public key cryptography is used in tiCrypt for secure key exchange, authentication, and digital signatures. Each user generates an RSA-2048 key pair at account creation. Authentication is public-key encryption + digital signature-based.

Crowd Security

tiCrypt users store fingerprints of public keys locally to prevent impersonation. SHA-256 is used for secure fingerprinting.

Minimal Privilege Architecture

Backend and frontend are decoupled; no implicit trust between components. All authentication and access are cryptographically enforced.

Secure Virtual Machines

VMs are cryptographically and physically isolated. No open ports except for secure, authenticated channels. Encrypted drives ensure secure computation and storage.

Advanced Auditing and Monitoring

Detailed audit logs track 30+ types of events with millisecond timestamps. Logs are chained and hashed (SHA-256) to prevent tampering.

Compliance with Regulations

Designed to meet HIPAA, FISMA, NIST 800-171, and FIPS requirements. Audit logs and controls support regulatory compliance.