Public-Key Cryptography
Public key cryptography is used in tiCrypt for secure key exchange, authentication, and digital signatures. Each user generates an RSA-2048 key pair at account creation. Authentication is public-key encryption + digital signature-based.
Crowd Security
tiCrypt users store fingerprints of public keys locally to prevent impersonation. SHA-256 is used for secure fingerprinting.
Minimal Privilege Architecture
Backend and frontend are decoupled; no implicit trust between components. All authentication and access are cryptographically enforced.
Secure Virtual Machines
VMs are cryptographically and physically isolated. No open ports except for secure, authenticated channels. Encrypted drives ensure secure computation and storage.
Advanced Auditing and Monitoring
Detailed audit logs track 30+ types of events with millisecond timestamps. Logs are chained and hashed (SHA-256) to prevent tampering.
Compliance with Regulations
Designed to meet HIPAA, FISMA, NIST 800-171, and FIPS requirements. Audit logs and controls support regulatory compliance.