Encryption technologies allow SECOTI to offer a set of robust communication tools that meet the security demands of its clients whilst giving them a host of other benefits along the way. The ability to encrypt mobile communication is a cornerstone of everything we do at SECOTI and if it was not around, we would simply not exist in this space.

Part of our success can be contributed to the work of a collection of individuals and outside influencers who have helped inform our product and company thus far. Below, you will find a list of key influencers who have helped us achieve our vision and whom we continue to look to as a source of inspiration…

Bruce Schneier

An American cryptographer and computer security professional, Schneier is often cited as an expert and founding father of cryptography. Dubbed a “security guru” by The Economist he is the author of numerous books, research papers and essays on cyber security and encryption and is highly regarded as an expert in the field. Aside from writing, Schneier is a frequent guest on television and radio and has served on several government committees where he offers his expertise. Schneier has been involved in the creation of many cryptographic algorithms and remains a figurehead and continuous influencer within the secure mobile communication industry.

www.schneier.com

Phil Zimmerman

Zimmerman hails from New Jersey, USA and is responsible for the creation of Pretty Good Privacy (PGP); the most widely used and recognised email encryption software in the world. This was back in 1991, since then, Zimmerman has been responsible for an extensive contribution of innovative ideas and practices within the mobile cryptography space. Most notably, Zimmerman developed the encryption protocol ZRTP (Zimmerman Real-Time Protocol) which is a cryptographic key agreement to determine the keys for encryption between two end points in a VoIP call. ZRTP is used extensively amongst firms operating within the secure mobile communication space today and is used as part of SECOTI Secure™ when encrypting voice calls.

Since 2011, Zimmerman alongside Mike Janke heads up Silent Circle, an encrypted communications firm based in Switzerland.

www.philzimmermann.com

Moxie Marlinspike

Marlinspike is a pseudonym. Wikipedia suggests that his real name is Mathew Rosenfeld.  An American and described as a computer security researcher and cypherpunk, Marlinspike has long disrupted the status quo within cryptography through his focus on techniques for intercepting communications.

A former head of cyber security at Twitter, Marlinspike later founded Open Whisper Systems in 2013. Here, he was responsible for the development of the Signal Protocol which is a cryptographic protocol which enables end-to-end encryption for voice calls, video and instant messaging.  Marlinspike has done extensive work with global tech firms such as WhatsApp, Facebook and Google to integrate his software Open Whisper Systems into their messaging services.

www.moxie.org

Pavel Durov

Dubbed the ‘Mark Zuckerberg of Russia’ after founding the hugely successful Russian social network, VKontakte. Durov made a small fortune (£183 million) and then dovetailed into the mobile encryption market with the creation of Telegram, the encrypted messaging app.  Although he is not responsible for the creation and development of any encryption protocol himself, Durov’s older brother (Nikolai) created the symmetric encryption protocol called MTProto which is the technology which encrypts the Telegram app and is based on AES-256, RSA 2048 and Diffie-Hellman key exchange.

Whitfield Diffie and Martin Hellman

Diffie along with his colleague Martin Hellman are often cited as pioneers of public-key cryptography due to their contribution to solving the problem of key distribution – a fundamental problem in cryptography back in the late ‘70s.

Their technique, dubbed the Diffie-Hellman Key Exchange, is a method of securely exchanging cryptographic keys over a public channel which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key – making exchanging data securely over a public network a possibility. Similar to ZRTP, their technique is used heavily within cyber security products especially within the secure mobile communication industry.

Today, Diffie and Hellman continue to work across cyber security acting on behalf of various companies and committees across the industry. They have been recognised many times for their work especially in the area of public-key cryptography, most recently receiving the 2015 ACM Turing award.

Ryuichi Sakai and Masao Kasahara

Like Diffie and Hellman, Sakai and Kasahara, are a pair of encryption experts who are responsible for innovative contributions to the field of encryption. The Sakai-Kasahara scheme (SAKKE) is an identity-based encryption system that allows a message to be encrypted when the sender only knows the public identity such as an email address of the receiver. Therefore, removing the risk posed by sharing public certificates for the purpose of encryption.

Often paired with Multimedia Internet Keying (MIKEY), MIKEY-SAKKE consists of a public-key cryptography scheme paired with a source authentication algorithm that is tailored to use identifiers instead of public certificates.