Security and Privacy

Providing sensitive data privacy protection solutions is a crucial aspect in areas of high socio-economic impact. The high innovative component and the high applicability and transversality of technologies such as Signal Processing in Encrypted Domain (SPED), network anonymisation, “obfuscation” of gps data transcends the limitations of the current technological solutions and provides a unique opportunity to achieve mandatory compliance with current and future legal regulations regarding data protection. The implementation of the solutions developed in this line will enhance the security and the confidence of the users in the systems of handling and processing of private data, without restricting the functionality offered by the companies / institutions, thus imparting a crucial competitive advantage for the companies of the Environment, as well as a new range of secure services that users can enjoy.

Another atlanTTic’s leading research fields is quantum cryptography. Quantum cryptography provides absolute security for communications and can not be breached even by an attacker who had all the computing power of the Universe. In other words, they are systems that can not be broken. In a world where sensitive or compromised information traffic is growing through the internet, governments and institutions are aware that they must work to create secure communication networks using these protocols.

Lines of Research

Líñas de Investigación

Random Number Quantum Generator

Production of random numbers through a quantum generator. With all the advantages this can lead to sectors with specific needs in this field, such as simulations or the online games sector.

Security analysis of QKD quantum cryptography systems

QKD is available with today’s technology, and has already entered the market to provide efficient and easy-to-use systems that provide an unprecedented level of security. Current QKD devices use simple quantum mechanical light states such as weak coherent pulses transmitted through optical fibers. Although classical cryptographic methods remain secure enough for short-lived encryption, quantum cryptography can be valuable in providing unconditional security, not only now but also in the long run. Even QKD with a very low bitrate (eg, hundreds of bits per second) can significantly improve the security of contemporary cryptosystems.

Forensic image and video analysis libraries

The software libraries developed constitute a unique toolbox in the market for the development of customized solutions in the forensic analysis of images and video. These tools allow the detection of manipulations, the determination of the camera with which an image has been taken, or the temporary location of a video recorded indoors.

Signal Processing in the Encrypted Domain Algorithm API

The implemented SPED library enables the development of externalized solutions (eg, cloud) that can process images, biomedical signals, genomic sequences or financial series, avoiding the need for specific hardware and ensure that confidential information is protected and Security requirements, privacy and European regulations on data protection.

Tools to ensure privacy in location-based services

Both private users and companies accept the conditions of use of private location information if they want to use the application. Among these conditions is the storage of that information (in an unsafe manner normally), so that the sending of such information is done through potentially unsafe channels and without anonymizing. We are working on generating tools that allow us to either anonymize or overshadow the location of the users, so that the service providers guarantee their privacy.

"Mixes" tools as tools to ensure anonymity in high latency communications

There are several options for increasing the anonymity of high-latency communications; However each option separately does not guarantee high standards of effectiveness in the anonymization, therefore it is necessary to combine different tools and methodologies to obtain better results. In this line a complete analysis of different existing mixes has been made to determine their strengths and weaknesses. A clear result achieved is a series of recommendations for the design of mixes.

Research Groups

Signal Processing in Communications Group (GPSC)
Antennas, Radar and Optical Communications Group (COM)

atlanTTic dedicates 100 m2 to R&D in the area of Security & Privacy, counting on a series of laboratories that act as support of the research activity developed by the team dedicated to this line of work, which has doctors and engineers.

Our research facilities are located in the School of Telecommunication Engineering (Vigo); Also functioning as a point of transfer of technological knowledge between the academic environment and industry.

  • Security (Communications)
  • Simulations
  • Online games
  • Sector TELCO
  • Energy sector
  • Health sector
  • Banking sector
  • Security forces
  • Public administration and justice
  • Defense
  • Financial services
  • Industry 4.0
  • Insurance
Title
Random Number Quantum Generator
Summary It is based on a system and a method for producing random numbers by a quantum random number generator, wherein the method comprises the steps of operating a single mode laser and high modulation bandwidth by an electric pulse generator, transforming the optical pulses Random phase produced previously in optical pulses with random amplitude and to detect the resulting random amplitude signals by a fast photodiode. The numbers thus produced are truly random.
Application and pros Securization of point-to-point communication channels
Application sectors Banking, military, online games
Intellectual property Granted patent
Title
Security analysis of QKD quantum cryptography systems
Summary Quantum Key Distribution (QKD) is a novel technique that exploits quantum effects to establish a secure secret key between two distant parties. This secret key is the essential ingredient of the one-time-pad or Vernam cipher, the only known encryption method that can provide information-theoretic secure communications. QKD is the prime example of ideas in Quantum Information Theory that use fundamental laws of quantum physics to accomplish tasks that cannot be achieved by purely classical means. It differs from classical key distribution schemes since in QKD one can actually prove the unconditional security of the final key.
Application sectors Ensure the confidentiality of communications regardless of the computational capacity of a potential attacker.
Application sectors Telecommunication operators, banking sector, military, protection of infrastructures of national interest, etc.
Intellectual property N/A
Title
Forensic image and video analysis libraries
Summary A number of forensic and video analysis libraries have been implemented.
Application and pros The software libraries developed constitute a unique toolbox in the market for the development of customized solutions in the forensic analysis of images and video.
Application sectors These tools will be very useful when developing solutions for legal forensics), insurance, press, protection of intellectual property.
Industrial secret N/A
Title
Signal Processing in the Encrypted Domain Algorithm API
Summary A Coded Domain Signal Processing (SPED) library has been developed for homomorphic processing of encrypted multidimensional images and signals that will serve as a basis for the development of cloud solutions that can process images, video, biomedical signals, etc. And to ensure that confidential information is protected.
Application and pros The implemented SPED library allows the development of externalized solutions (eg, cloud) that can process images, video, biomedical signals, etc., avoiding the need for specific hardware and ensuring that confidential information is protected. The technology developed brings a competitive advantage in the different links of the value chain without the need to use specific HW as in the case of HSM.
Application sectors Health sector, security forces, defense, public administration and justice, financial services and industry 4.0.
Intellectual property Industrial secret.
Title
Tools to ensure privacy in location-based services
Summary Both private users and companies accept the conditions of use of private location information if they want to use the application. Among these conditions is the storage of that information (in an unsafe manner normally), so that the sending of such information is done through potentially unsafe channels and without anonymizing. Work is being done on the generation of tools that allow either anonymising or overshadowing the location of users.
Application and pros There is no substitute product on the market. Both private users and companies accept the conditions of use of private location information if they want to use the application.
Application sectors Internet Service Providers, Application Developers, Empress Insurance.
Intellectual property N/A
Title
“Mixes” tools as tools to ensure anonymity in high latency communications
Summary There are several options for increasing the anonymity of high-latency communications, but each option alone does not guarantee high standards of efficiency in anonymization, so it is necessary to combine different tools and methodologies to obtain better results. In this line a complete analysis of different existing mixes has been made to determine their strengths and weaknesses.
Application and pros A clear result achieved is a series of recommendations for the design of mixes that increase the level of anonymity in communications.
Application sectors Internet service providers, security and cryptography, industry, energy sector.
Intellectual property N/A