Skip to main content

Public Key Cryptography Based​

tiCrypt uses [public-key cryptography](https://ticrypt.com/whitepaper/#public-key-cryptography) as the fundamental mechanism to implement all security measures. Authentication is public-key digital signature-based; encryption uses public-key encryption as well.

User Enforced Mechanism

tiCrypt enforces behavior through mechanisms rather than solely on policies. This reduces the risk of human error and ensures consistent adherence to security protocols. Users have the power. Admin control is [decentralized](https://ticrypt.com/whitepaper#combining-ticrypt--with-traditional-defense-mechanisms). ​ ​

Detailed Auditing

Auditing is fully integrated into the secure system, addressing [compliance requirements](https://ticrypt.com/whitepaper#compliance-and-monitoring) directly. It produces compliance reports, maintains a very detailed audit trail, and retains audit logs for the entire history of the system.​