Research is Telsy’s pulsing core. Together with its public and private partners, Telsy takes the field in post-quantum technologies to overcome the great threat exposed since the advent of quantum computers, developing solutions designed for future-proof security.
Telsy’s R&D team is engaged in the study of highly innovative and strategic topics in cryptography, cybersecurity, and quantum technologies field, applying to national and European calls by constantly collaborating with prominent academic institutions in thesis writing, internships, and PhDs, as well as in the organization of scientific and general conferences and webinars.
Today the threat of quantum attacks is a real danger. The protection of data and communications is linked to technologies that give future-proof answers, capable of thwarting threats with still partially unknown potential.
In this context, quantum-resistant solutions are needed that offer superior protection, bypassing the logic of traditional security protocols.
Telsy and QTI, a Telsy subsidiary company, take the field with Quantum Key Distribution (QKD) to overcome the problem exposed by quantum cyber attacks.
QKD is a technology that exploits the physical properties of photons to distribute random keys between remote users with unconditional security. These secret keys can then be used by existing ciphers, ensuring maximum security in communications.
The association between Telsy and QTI ensures a fully reliable end-to-end encryption system, compatible with the current telecommunications infrastructure for private and government applications.
Post-Quantum Cryptography (PQC) is a mathematical response that attempts to identify new mathematical problems, not vulnerable to quantum algorithms, which can be used within public-key cryptographic schemes.
Post-Quantum Cryptography, therefore, refers to the development of cryptographic systems, interoperating with existing communications protocols, adequate to face the threats posed by quantum, and also classical, computers.
SCADA networks are physiologically vulnerable to various types of attacks and intrusion by malicious actors. Being widely used in industry, infrastructure, and communication systems of large machinery (such as ships), the surface of exposure to attacks is a problem of absolute importance.
Telsy, in collaboration with institutions, private partners, and research centers, studies and develops cutting-edge technological solutions to avoid these risks.
Telsy integrates the most advanced artificial intelligence systems by actively collaborating in the development of new models and algorithms for multiple purposes:
- The “classic” correlation algorithms, to refine and optimize the integrations with the normal security alerts;
- The innovative Adversarial Machine Learning systems, which exploit Deep Learning models to create samples that escape detection engines, using them as evaluators of the goodness of the defensive system, allowing them to be strengthened towards potential new threats;
- Natural Language Processing applications, to give access to the huge amount of unstructured data that the web offers, without requiring huge amounts of human resources for the analysis of the sources.
Homomorphic encryption is a class of encryption methods allowing calculations to be performed on encrypted data without first decrypting it.
The possibility to perform computation without requiring access to the secret key makes homomorphic encryption different from typical encryption methods, which require data to be decrypted to be processed correctly.
The computations resulting from homomorphic encryption remain in an encrypted form and can be decrypted by the owner of the secret key at a later time, indeed it allows encrypted data to be processed as if it were in plaintext and produce the correct value once decrypted.
Within the natural convergence of the most innovative technologies towards the paradigm of the Cloud world, Telsy is focusing on issues relating to information security.
In particular, on the cybersecurity side, the focus is on solutions dedicated to the Cloud to support operators in the design and implementation of attack mitigation and response plans, while on the cryptography side, multi-cloud key management schemes are being considered to ensure transparency and privacy for the user.