Company
Portfolio Data
NUTS TECHNOLOGIES INC
UEI: N89NGZMW2CV3
Number of Employees: 4
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: Yes
SBIR/STTR Involvement
Year of first award: 2024
4
Phase I Awards
0
Phase II Awards
N/A
Conversion Rate
$388,128
Phase I Dollars
$0
Phase II Dollars
$388,128
Total Awarded
Awards
TALON2D: Tactical Autonomous Layer for Optimized Networking with Distributed and Decentralized Key Management
Amount: $139,584 Topic: N251-024
NUTS Technologies, an applied cryptography company, proposes leveraging its expertise in distributed, decentralized, and data-centric security solutions to evolve their existing distributed key management system (KMS) into a robust Certificate-Key Management System (CKMS) called TALON2D. The proposed solution is to address the U.S. Navy’s operational challenges and mission-critical requirements by providing a Certificate-Key Management System that is superior to commercial alternatives. TALON2D will operate in a self-contained environment and utilize a decentralized architecture, ensuring that in combat damage scenarios, TALON2D can continue to operate.TALON2D’s core innovation lies in their data-centric approach through the use of applied cryptography to create secure data objects that combine cryptographic protections with fine-grain access controls (this may include role or attribute based access control) embedded directly at the data layer. This design enforces Zero Trust principles, ensuring that only authorized entities can access specific keys or data while providing granular permissions, traceability, and resilience. The designs threat detector mitigates against Man-in-the-Middle (MITM) attacks, spoofed commands, and status message spoofing by cryptographically locking and verifying each data object for both data at rest and in transit. By automating key and certificate lifecycle management, including generation, distribution, renewal, and revocation; TALON2D reduces administrative overhead, enhances security, and increases operational efficiency. The solution aligns with the DoD Zero Trust Strategy and its Data Pillar by embedding governance, labeling, encryption, and rights management directly into its design.To address combat-damage scenarios, TALON2D’s individual nodes are designed to run autonomously by default. TALON2D’s nodes are designed to replicate and build resiliency in decentralized and distributed architecture ensuring that even if individual nodes or servers are compromised, the network continues to operate securely. Dynamic scalability with a unique cryptographic access control called “Verify-Only”, allows for the seamless addition of new nodes, such as other ships, enabling mutual support and strengthening resiliency without exposing sensitive keys or data.Phase I of this effort will demonstrate the feasibility of TALON2D through architectural diagrams, modeling, and prototype demonstrations of critical components. Key objectives include feasibility studies on its autonomous operation, resilience in combat-damaged networks, integration of PQC, and automation of cryptographic lifecycle management. TALON2D offers a transformative, secure, and scalable solution to ensure mission-critical communications remain operational and trustworthy under all conditions.
Tagged as:
SBIR
Phase I
2025
DOD
NAVY
Easing Transitions to New Cryptography with Structured Data Folding with Transmutations (SDFT)
Amount: $99,990 Topic: 3
Structured Data Folding with Transmutations (SDFT) provides a framework for producing portable, secure messages enabling facile cryptography transitions indefinitely. As ciphers age and exhibit fallibility, new ciphers are introduced resulting in a parade of cryptography transitions over time. SDFT streamlines cipher transitions at the message level for both data-at-rest and data-in-transit. SDFT advances beyond concepts of Message Level Security (MLS) by allowing every SDFT message to self-describe and self-prescribe how the message within was produced. Cipher transitions are introduced with various levels of urgency by each organization. Custom cryptography implementations will incur high transition costs due to a shortage of qualified experts. Indifference or ignorance can lead to catastrophic data breaches as adversaries resort to retrospective decryption attacks. Even the best cryptography transitions may introduce new flaws into the application, leading to less security than expected. We will research and prototype to extend the existing SDFT Python library to handle the latest NIST PQC candidate algorithms and show why SDFT messages should be a new standard and best practice in industrial and government cipher technologies.
Tagged as:
SBIR
Phase I
2024
DOC
NIST
Structured Data Folding with Transmutations (SDFT): Migration to Post-Quantum Cryptography (PQC) and Beyond?
Amount: $74,277 Topic: AFX245-PCSO1
NUTSTECH's Structured Data Folding with Transmutations (SDFT) represents a pivotal advancement in cryptographic technology, addressing the imminent threat posed by quantum computing to public-key cryptography. This innovative solution offers a standardized framework that simplifies the implementation of post-quantum cryptography (PQC), ensuring secure data transmission and storage. By enabling seamless integration of new cryptographic standards without the need for extensive technical expertise, SDFT facilitates ongoing adaptability in the face of evolving cyber threats. Its unique capability to self-describe and prescribe cryptographic methods enhances message-level security, providing a robust defense mechanism for the Air Force's digital infrastructure. With NUTSTECH's proven expertise and patented technology, this project not only fulfills a critical defense need but also sets the stage for widespread adoption across diverse programming environments, thereby fortifying the United States' cybersecurity posture in the quantum era.
Tagged as:
SBIR
Phase I
2024
DOD
USAF
Insider Threat Defense (ITD) with NUTS Technologies
Amount: $74,277 Topic: AFX237-PCSO1
The growing trend of high-profile data breaches impacting the U.S. military highlights the flaws inherent in the core security design philosophies of conventional data sharing.á A distributed, data-centric security model is the next generation core design
Tagged as:
SBIR
Phase I
2024
DOD
USAF