Private Encrypted Data Storage Server PQC


CIS Data Storage server solution answers one of the most challenging Cyber data at rest problem that the IT industry is currently facing. It is official that the RSA, Elliptic Curve Encryption, AES 256 protocols are reaching end-of-life cycle considering the rapid evolution of Quantum computing capability. No longer can sustain the integrity of the Data storage, posing a significant threat across multiple domains and industries on both Government and the private sector.

How it works


The demand of integrating of the Homomorphic or PQC encryption within the data storage servers is currently very challenging and extremely difficult to implement due to the fact of the extreme ratio overhead increase of storage space when the encryption protocol is embedded within the data. The overhead ration makes the integration not feasible due to the drastically cost efficiency, latency, and compatibility.


At CIS, we looked at the problem from a different angle and engineered a new holistic approach to address the issue by enabling a feature capable to answer one of the most challenging aspects of storing, accessing, sharing, downloading, or uploading the Data over PQC Kyber 1024 Level 5 encryption protocol.


We introduce the Virtual Dissimulated Encrypted Server (VDES) Gateway, which physically resides between the ISP modem/router and the Data Storage server. The VDES server is designed to obfuscate the real end point IP address of the data server, incorporating the Decoy Obfuscation Tool (DOT) technique, protecting the server against machine learning predictability, AI, analytics, and pattern of life (POL).


VDES assumes the role of redirector for the inbound and outbound traffic, accepting the ISP IP, and then randomize the traffic over PQC encryption over multiple IP addresses enabling connectivity to the data server.


The VDES server infrastructure is designed and configured based on the highest security standards, with multiple layers of protection and an Intrusion Detection System (IDS) in place.


The data storage server resides at the customer’s preferred location for oversight and physical security.

The data storage server can be remotely accessed.

The customer has full privileges to edit, manipulate, and share data from anywhere in the world.

For questions or additional information