“Signing everything” means using cryptographically secure digital signatures on every transaction. In this zero-trust environment, data is only sent/ingested when valid digital signatures are used. No more shared secrets.

We achieve this by combining the most advanced key management protocol available, Key Event Receipt Infrastructure (KERI), with an approach to confidential and authentic data exchange called ESSR, for “Encrypt Sender’s key and then Sign Receiver’s key”, which is detailed here. For a more accessible explanation see the following: PKAE1, PKAE2, PKAE3.

This unique combination of protocols allows our gateways to establish True Zero-Trust connections that rely on post quantum secure identifiers, while keeping your “keys at the edge”, where they belong.

Setting up

The first step to securing all your data is setting up your environment and installing the demo software.

Learning RACK

Next is learning how our Routing, Authentication and Confidentiality with KERI (RACK) Gateways work. Install and configure using the following tutorials to learn how secures your data transactions.