The solution? QUICK!
At Cryptshare AG, we thought there must be an easier way, so we worked hard on a suitable solution: QUICK. QUICK automatically manages security between correspondents. Users can activate QUICK at any time and with anyone they like, completely independently and without any help from an administrator. After activation, it makes any manual effort for password handling or transfers obsolete saving users valuable time while securing all of their transfers. All future communication between them is automatically secured with unique one-time keys, facilitating passwordless security for users.
How does it work? During the first transfer between two communication partners, QUICK automatically generates a shared key. This key is used to create one-time keys for all future transfers that encrypt and decrypt data and files of specific transfers between correspondents. The recipients automatically apply these keys without having to enter them or exchange them with the sender. This way, all future communication between them is protected.
Use cases and benefits of QUICK
QUICK brings great potential for secure and regular data exchanges that extends to a wide range of use cases. By securing all future transfers, machine-to-machine communication is enabled to perform regular and unlimited exchanges without any password-related delays for their automated processes. Additionally, once activated QUICK enhances efficiency as well as auditability by guaranteeing individual single-use keys for each transfer completely independently of the user.
Since its keys are derived by the system, QUICK is not only a game-changer regarding its unparalleled usability but it also adds protection from social engineering attacks: Any personal data third parties may have collected about the sender for launching attempts to derive the transfers’ passwords are simply rendered useless. QUICK adds protection against trivial passwords based on personal information and has complex and automated system-generated passwords. These passwords cannot be derived by using information about the users’ personal lives.