Distributed Symmetric Key Establishment (DSKE)​

Delivering the industry’s first symmetric key distribution technology that achieves future-proofed security at scale, without asymmetric encryption​

Diverse male and female engineers using laptop in computer server room
3D Illustration. Electronic motherboard. Abstract digital technology background.
How it Works

Trusted technology for defense-in-depth

Organizations rely on key distribution to exchange and protect highly sensitive data. But legacy key management processes can be error-prone, expensive to manage – and breakable. Distributed Symmetric Key Establishment (DSKE) is a modern key distribution technology. It fully automates the creation and distribution of symmetric keys, without relying on computational complexity or asymmetric encryption. DSKE is the industry’s first scalable symmetric key technology, combining the scalability of PKI, the security of quantum key distribution (QKD) and the simplicity of pre-shared keys.

DSKE Benefits

Symmetric key distribution technology ​

DSKE is the industry’s first key distribution technology that delivers future-proofed security at scale without the use of any asymmetric cryptography.

Future-Proof

Scale with Ease

Integrate Effortlessly

Distributed Symmetric Key Establishment (DSKE)

Our technology ensures secure symmetric key distribution, with protection against both quantum and classical attacks

Unlike Standard Pre-Shared Key Solutions, DSKE Easily Scales To thousands of sites and supports any number of network devices

DSKE Integrates Seamlessly With Your Existing Systems And Encryption Protocols, Including Post-Quantum Cryptography and Quantum Key Distribution Systems.

Publications & Credentials

DSKE White Paper and Security Proof

DSKE relies on pre-shared random numbers between DSKE clients and a group of Security Hubs. Any group of DSKE clients can use the DSKE protocol to distill from the pre-shared numbers a secret key. The clients are protected from Security Hub compromise via a secret sharing scheme that allows the creation of the final key without the need to trust individual Security Hubs. Read our DSKE White Paper and Security Proof.

White Paper

Security Proof