Modular Encryption Is Here! A Step Beyond Blockchain

We shall remind ourselves of what we know as Blockchain because, in a certain way, Modular Encryption and Blockchain are closely related.

What is Blockchain?

Let’s try to explain what Blockchain is with one of Blockchain’s most endearing companions. Do you remember Bitcoin? Not long ago it was an unstoppable phenomenon on the Internet. Every computer expert or geek knew it. The famous cryptodivisa was always driven by the Blockchain.

The Blockchain data structure spun around for years until it became popular in 2008, thanks to the appearance of the Bitcoin digital coin. Blockchain is the technology that makes it possible, since it acts as a database and backup of the same. It is, in itself, like a great compendium of digital events shared collaboratively by many parties. A general ledger or register kept among many.

Blockchain works like a long virtual chain formed by blocks, in which when one of its users intervenes, carrying out a transaction with another user, the operation is registered in one of its blocks.

The above-mentioned blocks are filled when a certain number of transactions are reached, always recording all the operations that have been carried out up to that moment. The following transactions will be recorded in a new block. The blocks are linked consecutively through a virtual link. All participants in the blockchain can access the complete copy of the blockchain as long as it is public.

Their possibilities are extensive and obvious, and, of course, they are not only useful with Bitcoin. The Blockchain, by its attributes, could also be used, for example, in the electronic vote, the fiscal bureaucracy (saving us enough in frauds, given the transparency of the tool), or in creating backups of company databases.

Approaching Modular Encryption

What about Modular Encryption? Another of the qualities of Blockchain on a futuristic pedestal is undoubtedly its asymmetric encryption system, which is a breakthrough in the world of encryption. With its system, users have a public key, which becomes available to anyone and with which they will receive their movements, but also another private key, with which they will be able to sign their transactions. This means a two-way lock for all unauthorized people who like to pry into foreign systems.

The only problem in this infallible system, which has not yet been solved, is the compartmentalization of encrypted data. We have the files encrypted, but what happens if we decide that a third party only has access to a section of the information included in the file? Here we only have one key available, which gives us access to the entire file. Or we offer absolutely everything or nothing.

This is where the Modular Encryption comes in, the future project in which technology companies invest their time and money. With it they intend to develop a modular file encryption system that will give their users the opportunity to have greater control over their information.

“The idea is that whoever has control of the data has the master key to encryption, but also the ability to create partial keys so that others can access only what interests them”, makes clear Francisco Javier González Gala, project manager of the security and defence area of Atos Madrid, a subsidiary of the French company in charge of this remarkable project.

The goal is to create a new type of effective encryption that serves as an alternative to traditional all-or-nothing encryption. It will then be able to allow the partial view of the encrypted information, further improving the security of the system.

There are many applications for this innovative system. Without going any further, they could be the same ones that have been found in Blockchain, technology with which it could compete and which it could leave behind. Javier Gonzalez Gala states that one of the possibilities of this new system would be related to the world of health: “If there were a single record of records, our system could manage access to different parts of the record, according to the specialty of each doctor”. But we can go even deeper into their pragmatism and tackle fields such as the protection of trade secrets or the traceability of food.

These types of encryption ensure the security of businesses and users, but are there other ways to do this? Are there other safeguards that can help us? Looks like it. Do you know Pandora FMS? Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.

You can send any query you have about Pandora FMS. You can do that in a very simple way, thanks to this contact form.

Do you want to stay updated?

Pandora FMS newsletter, will keep you informed about new releases, plugins, features and integrations. We won't ever give your email to anybody else.

You're now subscribed to Pandora FMS. Thanks!


Download the most comprehensive report on secure monitoring from IDG research