After spending time at a London fintech acceleratorlast year, enterprise databasestartup ZeroDB scrapped its first business plan and mapped out a new one. By January this year it had a new name: NuCypher. It was no longer going to try to persuadeenterprises to switch out their Oracle databases but rather to sell them on a specialized encryption layerto enhance their ability to perform big data analytics by tapping into the cloud. Its slogan: body armor for big data.
Today itslaunching an open source version of its general releaseproduct here at TechCrunch Disrupt New York. At this point, the almost 1.5-year-old startup is also running a handful of pilots with major banks, says co-founder MacLane Wilkison.
Its a combination of cloud and big data, he says of the underlying drivers which the team reckons are creatinga need for the technology. Now all of a sudden youre workingin computing environments that are distributed across hundreds or thousands of machines, and that could be spanning both some on-prem, some private and evenpublic cloud. And that sort of scenario presents a lot of new and different security challenges.
Instead ofbuilding an open source end-to-end encrypted database, NuCypher is selling a proxy re-encryption platform forcorporates with large amounts of sensitive data stored in encrypted databases to letthem securely tap into the power of cloud computing. An idea that might need a bit of explaining to appreciate, but one thats grounded in a genuineneed at least based on what NuCyphers earlybanking partners are telling it.
On the competitors front Wilkison names the likes of HP-owned Voltageand Protegrityas the largest existing players in the space. Albeit, he says theyre both doing tokenization of data, whereasNuCypher reckons proxy re-encryption technologyoffers greater security for certain types of data.
Unlike some other approaches to processing big data in the cloud, heemphasizesthat NuCypher is not using tokenization to mask any data arguing this is necessary for the target customers because certain types of data when masked with tokens can be vulnerable to statistical attacks.
While proxy re-encryption is an existing area of cryptography, applying it to big data is whats novel here, according toWilkison, who saysthe tech has mostly been used in academia thus far. Were the only people that applied it to big data platforms like Hadoop and Spark, he says. As far as I know were the only one using proxy re-encryption in business.
So while the teamsearly ideas focused mostly onlooking at data archiving and encryption to enable banks to make use of cloud storage, he says the businesswas pulled onto its currentrails afterbanks asked if theycouldapply the encryption tech the team hadbeen building for data archiving to big data cloud processing.
Safe to say, this mini pivot is a familiar story for enterprise startups after all, who knows better the businessneeds than the target customers?
When we originally started the company, my co-founder and I had built an open-source database and then an encrypted database that allows you to operate unencrypted data without sharing encryption keys with the database server What the banks were particularly interested in was taking some of what we had built for that and applying it to more compute-heavy type of workloads, says Wilkison.
After a period of talking to customers we took some of what we had built for that and made it into a more generalized encryption layer for different platforms specifically for the big data space. So Hadoop, Kafka and Spark.
So what is proxy re-encryption aka NuCyphers secret sauce, as Wilkison putsit and why isthe technique useful for banks?
Proxy re-encryption is a set of encryption algorithms that allow you to transform encrypted data. Specifically it allows you to re-encrypt data so you have data thats encrypted under one set of keys, you can re-encrypt the data without de-encrypting it first, so that now its encrypted under a second, different set of keys,is how Wilkisonexplains it.
He gives the example of a person who has some encrypted files stored in Dropbox. If they want to share the files with someone else that could be achievedby downloading them, decrypting them with their key and then re-encrypting them with the public key of the person theywant to share with. But obviously at scale thats a pretty network-intensive and cumbersome process.
Even more naively, this personcould just share theirprivate encryption key with the person theywant to share the file with. But then theyreabandoning all control of theirsecurity.
Clearly neither scenario is ideal for NuCyphers target customers with their vast lakes of sensitive, highly regulated data. This is where NuCypher reckons proxy re-encryption can step in to offer an edge.
What I can do with proxy re-encryption thats much more elegant and secure than either of those alternatives is I can basically delegate access to my encrypted data to someone elses public key, he adds.
The platform creates a re-encryption token off of the public key of the entity with whom its customers wants to share data. That token can then be uploaded to the cloud where the third partycan access it in turn enabling them to decrypt and access the data.
Wilkison says re-encrypted tokens can be created and used todelegate access to as many people as I like.
Ensuring compliance with regulations around the processing of sensitive data data such as a bank or healthcare company might hold is one key selling point for the platform.
Hepoints to a regulation like HIPAA, which sets standards for protecting healthcare data, as one example where a lot of care is needed when handling data toensure compliance. He also flags upthe European Unions incoming GDPR (General Data Protection Regulation), which ramps up penalties for violations of rules on processing citizens personal data, as another instance ofdata-centric lawscreating data processing pain-points thatNuCyphers platform is setting out tofix.
Other target data-laden industries couldinclude telecoms and insurance, though the team has kicked-offfocusing on financial services, and the current pilot phase of the platform is with major banks.
Wilkison saysthere are essentially three main use-cases for the platform:
Another benefit henotes isthat NuCyphers proxy re-encryption technology enables itto givecustomers the ability to manage access controls without needing to provide full access to the data which meansit canremove any single point of failure (i.e. via an admin who has to have full access control to all of the data).
With NuCypher a hacker would have to hack into each node individually in order to get all the data, he adds.
Given the complexities of the technology, customer education is clearly one of the big challenges, with Wilkison saying thisboils down toexplaining how the approach differs from standard encryption.
And on that front, he says one selling point for the platform is that theproxy re-encryption tech works with NIST standardized encryption algorithms. Which means NuCypher customersdont have to abandon the tried and tested encryption algorithms theyre comfortable using, such as AES-256, in order to make use ofthe tech.
That was one of the pieces that we added that took a pretty significant amount of research to develop for us to get proxy re-encryption to work with things likeECIES, which is a standard elliptic curve, NIST-certified, he notes.So we can go to a customer and say, everything that were doing on a crypto level is very standardized, very well understood by industry. So theyre not having to rely on newly rolled crypto.
NuCyphers platform exists as an SDK and an encryption library, so its business model is licensing the software its not hosting any data itself, confirmsWilkison; customers can install the softwareon premise, such as within an existing Hadoop deployment, or directly in the cloud on the infrastructure theyre managing.
Funding-wise, the teamhas raised a $750,000 seed round to date, from Valley investors including Base Ventures, NewGen Capital and some angels. It also went throughY Combinator last summer. Wilkison says it will be looking to raise again in Q3 this year.
How big do they reckonthis market is? Wilkison says hes hoping the current six to seven pilot customers of NuCypher will turn into high double digit or maybe low triple digits in a years time. But with those target large enterprises typically spending vastamounts of money on securely storing the sensitive data theyre entrusted with,theres also a very sizeableincentive for them toshift some of that compute load into the cloud.And, potentially, a lot of money at stake if NuCypher can convince them to buy in.
NuCypher presents at Startup Battlefield at TechCrunch Disrupt NY 2017
NuCypher presents at Startup Battlefield at TechCrunch Disrupt NY 2017
NuCypher presents at Startup Battlefield at TechCrunch Disrupt NY 2017
NuCypher presents at Startup Battlefield at TechCrunch Disrupt NY 2017
NuCypher presents at Startup Battlefield at TechCrunch Disrupt NY 2017
NuCypher presents at Startup Battlefield at TechCrunch Disrupt NY 2017
Judges Q&A
Q: Can you talk a bit more about how far along you are with some of the early clients? A: Were in pilot stage right now. The bulk of our early customers are in financial services. Were starting to get traction in healthcare and telcos as well. Pilot phase at this stage.
Q: Tell me a bit more on the competition A: Theres a couple of ways to look at this. One: the platforms that we support do have some native data protection built in. So Hadoop for example. These tend not to be robust enough for the types of enterprise customers that were working with. Other alternatives include data masking and tokenization. HP Voltage for example.
Q: You worked before at Morgan Stanley. Why did you leave a steady job with nice salary and Wall Street and went into this kind of adventure? A: Ultimately I wanted to get back to a more technical role, and actually start building a product in a company again as opposed to building financial models and pitch decks
Q: And this is the actually launching of the product? A: Were launching the open source version. Weve had Hadoop available for a while. And then Kafka is launching as well
Q: What did your mother say when you told her that you were leaving Morgan Stanley for this adventure? A: She was supportive. Although maybe didnt quite understand what we were doing
Q: Can you tell me more about the implementation? What does it look like as you deploy to enterprise how do you get all of their existing data encrypted and how do you do key management? A: On the key management side we actually integrate with hardware security modules so at lots of banks we use HSM from vendors like Thales or SafeNet.
For Hadoop we encrypt at the HFS layer. And everything is transparent to applications running on top of Hadoop, so it doesnt change the experience for someone running Hive queries for example.
And we also integrate with access control tools like Ranger and Sentry. So people can keep using the standard tools that they use.
Q: Is your business a classic SaaS model? A: Were not hosting anything. Its not software as a service. We have term-based subscriptions, and then also a consumption-based model for cloud deployments.
Q: How do you intend to go to market? Sales force? direct sales? A: Some combination of direct sales, which weve done today, and then also the channel partners and big data vendors and the cloud service providers as well, folks like Amazon and Microsoft.
Q: Who are your main competitors? A: The data masking and tokenization companies are the one we run into most regularly. Voltage which is now part of HP. In Europe we see a company called Protegrity pretty frequently. And then as I mentioned before a lot of the underlying platforms will have some sort of protection tools natively.
Q: Do you run into people like Ciphercloud or Ionic? A: Not so much anymore. Were similar in some ways to them were more focused on infrastructure like Hadoop and data platforms
Q: How many people are you now? A: Were the two founders and then seven people total on the team
Q: And how much money did you raise? A: Weve raised $750K so far from Y Combinator, NewGen Capital and Base Ventures
Q: How long ago? A: Last fall
Q: How hard would it be for your competitors to replicate the work that youve done? A: Certainly its a lot easier now that its open source That said we do have an open core approach so we have certain enterprise features that are still proprietary that are only available in the enterprise version. Additionally if the Hadoop vendors integrated what were doing natively into Hadoop thats still just for Hadoop.
So NuCyphers meant to be layered, it sits across all of the organizations big data platforms. Right now theyve use Hadoop, Kafka, Spark. In the future that could include some new SQL databases, and potentially structured databases as well
Q: Judging from your experience with your colleague how do you compare the American level of mathematics and physics to the Russian one? A: The American approach is lacking. Im hugely impressed. Not only is my co-founder Russian educated, and Russian born, a lot of our engineers are as well, so weve been very fortunate in that regard
See the article here:
NuCypher is using proxy re-encryption to lift more enterprise big data into the cloud - TechCrunch
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]