Secure your cryptographic keys in critical software and apps using industry-leading white-box cryptography.
Secure Key Box automates the implementation of cryptographic protocols such as DUKPT key management and TR-31 key blocks.
Even the strongest encryption methods fail when the encryption keys are compromised. Hackers can easily find and steal exposed cryptographic keys in code or memory. whiteCryption Secure Key Box protects your data and secrets by transforming keys and the algorithm logic so that keys never appear in the clear. This ensures that keys cannot be extracted—even if the device itself has been compromised.
whiteCryption Secure Key Box seamlessly integrates with your application code to keep credentials and keys safe, without the need for specialized hardware.
When it comes to building a tap to phone app, the regulatory hurdles around mPOS can be overwhelming. Learn about some of the specific requirements under PCI CPoC and how whiteCryption solutions help you comply.
Secure Key Box conceals and obscures keys and algorithm logic so keys can’t be extracted and tampering attempts are shut down.
Our industry-leading white-box technology also protects web app crypto keys, keys in Java applications, and secures end-to-end communications.
Secure encryption keys in web apps
Cryptographic keys in your JavaScript web apps are at high risk. Browsers don’t have access to device hardware-based protections available to native apps. Every cryptographic operation performed in a JavaScript app exposes the keys for easy extraction. Secure Key Box (SKB) for Web keeps web app keys and credentials safe from attack.
Protect trusted communications
Communications are only as secure as the keys used to encrypt them. whiteCryption Secure Key Box (SKB) for TLS ensures the keys used to establish a TLS connection, as well as the session keys, are always protected. Keys never appear in plain form in device memory, remaining encrypted, even when in use.
Protect keys when stored, in transit, and in use
Keep keys safe at all times, even on compromised, jailbroken, or rooted devices. Keys are never exposed in memory; algorithms operate directly on encoded keys.
Shorten development time
Replace your standard cryptographic libraries with drop-in white-box secured key protection. No need to develop different protection mechanisms for different operating systems and platforms.
Any algorithm, any platform
Agnostic security works on all platforms and devices. Protect any cryptographic algorithm including AES, 3DES, RSA, SPECK, ECC, ECDSA, DH, ECDH, HMAC, and SHA. Custom algorithm support also available.
Proven technology backed by experts
Intertrust’s deep application protection expertise guides every step of your deployment. Secure Key Box protects keys and sensitive data in millions of installed apps and undergoes regular independent security testing.
Start your all-access Secure Key Box trial