Blockchain is Not

Inherently Secure

Blockchain and Digital Ledger Technology (DLT) provide a foundation for disruptive innovation across all sectors and industries. Its success, however, likely depends on whether security is assured at all stages of the solution lifecycle.

While records on a blockchain are well protected through cryptography, the code and cryptography underpinning blockchain architectures are often complex, with undiscovered flaws.  For many projects, security has taken a back seat as enterprises or inventors rush to become first to market. Flaws in the design or implementation of blockchain networks leave them open to exploitation. Passwords and keys can be appropriated and misused. The distributed nature of infrastructure, clouds, and trust relationships have been exploited.

Kudelski Security empowers enterprise adopters to build security and encryption into their blockchain solutions from the start, making integration of highly secure components seamless and straightforward. With over three decades of cryptography expertise, and some of the world’s foremost blockchain thought leaders, we will help you succeed at every stage of your blockchain implementation — from inception and design to architecture review and training.

Blockchain/DLT

Security Services

Security Audit, Assessment, and Validation

Security Architecture Review

Security Design and Implementation

Security Training

Case Studies

Blog

  • Crypto Exchange Security
    by Scott J. Carlson on December 5, 2019 at 7:10 am

    This article is a practical summary of the top five areas, common to all major security standards and frameworks, which crypto exchange companies need to engage with, in order to protect their platform. Understand Risks and Threats Business Process Controls Policies and Procedures Vendors and Third Parties Security Vulnerabilities and Operational Capabilities (Pen Test!) According […]

  • Forget Homomorphic Encryption, Here Comes Functional Encryption
    by Yolan Romailler on November 25, 2019 at 8:19 pm

    Have you ever heard of Functional Encryption (FE)? If so, you may be associating it with some sort of homomorphic encryption, which is not wrong, […]

  • Google, IBM, and the Quantum Supremacy Affair Explained
    by Tommaso Gagliardoni on November 20, 2019 at 4:05 pm

    You have probably heard about some big announcement by Google on the topic of “quantum supremacy”, and maybe also about a rebuttal by IBM criticizing […]

  • Audit of Binance TSS-lib
    by Tommaso Gagliardoni on November 6, 2019 at 2:06 pm

    Binance created an open source software library available on Github implementing a threshold ECDSA signature scheme (TSS), and hired Kudelski Security to perform a security […]

  • Audit of KZen’s Multi-party ECDSA
    by Nathan Hamiel on November 4, 2019 at 3:36 pm

    KZen hired Kudelski Security to perform a security assessment of their Multi-party ECDSA library and provided us access to their source code and associated documentation. […]

In the Press

Let's Talk