Protecting Sensitive Data through Novel Algorithm Transformations and Algebraic Splitting
Department of Defense
Agency Tracking Number:
Solicitation Topic Code:
Small Business Information
ARXAN RESEARCH, INC.
3000 Kent Avenue, Purdue Technology Center, West Lafayette, IN, 47906
Socially and Economically Disadvantaged:
AbstractThis Phase II proposal extends the technique developed during Phase I for protecting CPI into a commercially viable and generally applicable source-to-source transformation engine. In addition, we expand the Phase I approach to support high-performance secure computation through careful division of tasks, between a slower secured processor, and multiple high-performance general-purpose COTS processors, through the process of secure outsourcing.
* information listed above is at the time of submission.