Products

1002
KRIPTA KEY KRIPTA KEY KRIPTA KEY
KRIPTA KEY KRIPTA KEY KRIPTA KEY

A solution to protect your assets, choose the method that fits you best

Kripta Key provides a flexible and scalable solution designed with modular infrastructure, allowing seamless integration to meet diverse needs. The modules are KK-Manager, KK-Cryptoservice, KK-Tokenization Service, and KK-Transparent Data Protection. Each module has its own respective functions.

KK-Manager

The Comprehensive Key Management Server

A robust solution for managing the entire key lifecycle.
Handle key generation, secure distribution, and automated rotation with ease, ensuring your cryptographic assets remain protected at every stage. It securely stores all your keys, secrets, and certificates in one secure centralized location. It also distribute Data Encryption Keys (DEKs) to local KK-Cryptoservice vaults via a secure key exchange protocol, providing reliable and efficient cryptographic operations across your systems.

KK-Cryptoservice

The Trusted Cryptographic Server

A powerful solution delivering secure cryptographic operations.

tool

KK SDK API

Seamlessly integrate with support for PHP, Java, .Net, and Go.

web development

KK REST API

Simplify interactions by sending HTTP requests and receiving responses in JSON format for ultimate flexibility.

KK-Transparent Data Protection

A seamless solution designed for modern security needs

Protect data without altering the source code of your legacy applications, ensuring smooth implementation with zero disruptions. Your data is secured without compromising your existing workflows or infrastructure.

KK-Tokenization Service

Secure and Format-Preserving Data Protection

A cutting-edge solution for protecting sensitive information.
Ensure tokens maintain the same format as the original User Sensitive Value (USV), preserving compatibility with existing systems and workflows. You can choose between vaultless and vault-based storage to meet your specific security and performance requirements. KK-TS delivers reliable, seamless tokenization, ensuring your sensitive data stays protected while maintaining operational efficiency. 

Industry

product banner

Product Integration

Provides various methods and languages to streamline the application integration.
newlayer

KK Rest API

KK Server SDK
(PHP, Go, Java, .Net)

Mobile SDK
(Flutter, Kotlin)

Web-based SDK
(Java Script)

TDP
(MySQL, PostgreSQL)

KK-TS RESTAPI
(Vaultless and Vault-based Tokenization Service)

Legacy App

TDP

Database Server

Database Engine

KK KRIPTO SERVICE

KK MANAGER

Kripta Key Appliances

REST API

KK-TS

(Tokenization Service)

App Server

REST API
REST API

Database Server

Database Engine
SDK
Website (frontend)
Mobile app (frontend)

Product Deployment

High availability with strong backup recovery

Business Application

Load Balancer
KK-TS on Virtual Machine
Load Balancer
KK Crypto Service
on a Hardware-based root of trust
KK Manager
on a Hardware-based root of trust

MAIN DC

Business Application

Load Balancer
KK-TS on Virtual Machine
Load Balancer
KK Crypto Service
on a Hardware-based root of trust
KK Manager
on a Hardware-based root of trust

DR

One Way
Replication

Kripta Key Security

Full Control Over Your Data

Kripta Key comes as a "box" solution deployed on your premises and integrated with your applications and infrastructures. Your data remains entirely within your insfrastructure and is never stolen or sent '"back home".

Higher Security

Kripta Key operates without requiring internet access. It features no "admin panel", no integrated analytics or tracking, no UI and no "insecure" mode.

High Availability

The Kripta Key cryptographic module operates without requiring a connection to the Kripta Key Management server, provided that the cryptographic objects have already been stored in the local KK-Cryptoservice.

Strong Cryptography

Kripta Key use strong proven cryptographic algorithm (NIST publications): AES-GCM-256, RSA, ECDSA, EdDSA Ed25519, CMAC, GMAC-256, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, shamir's secret sharing scheme, etc.

Secure Coding

Our software engineers are educated in secure architecture and coding practices, and write code based on platform-specific guidelines and NIST publications, while considering industry best practices.

Precise Access Control

Kripta Key is built on a distributed architecture. Even though distributed KK-Cryptoservice instances may be placed in different institutions, only the application registered with that specific KK-Cryptoservice and partition can access the keys.

Request Demo