top of page

Cryptographic Discovery

Crypto Discovery.png

Search for cryptographic keys and encryption types

The rise of quantum computers will render much of the existing cryptographic algorithms useless, including RSA, AES 128, ECC, Diffie Helman and others. This is a major threat to any organization holding sensitive data (any enterprise, government, hospital, etc.).

 

The U.S. National Institute for Standards and Technology (NIST) has been evaluating algorithms that can withstand quantum computers and recently selected four for PKI and digital signatures. As a result, proactive organizations want to discover, classify, and inventory their existing crypto so they can prioritize what to replace and are asking for solutions to help do this. 

How We Help

1touch.io Inventa 3.3 now has cryptographic discovery to find secrets and cryptographic assets in storage. Examples include: 

 

  • type of secret (key, token, credentials, etc.)

  • crypto function (MD2/5, SHA, HMAC, etc.)

  • crypto algorithm (DSA, EC, DES, AES, CMS, etc.)

  • length of encryption key (128 bits, 256 bits, etc.)

 

With our classification search, the user can easily filter to find “128 bit keys” or “DES” to create a simple inventory of vulnerable encryption in their environment. Then, with a single click, the list can be exported to the relevant tools - ServiceNow, SIEM, SOAR - for remediation.

Inventa for Cryptographic Discovery solution brief

Respondents to a recent Deloitte survey believe their organization is at risk for “Harvest now, decrypt later” attacks where bad-actors hoard encrypted data until quantum computers are ready to break the protections

Let us help you get started

bottom of page