Darkstrike™ | Quantum Data Security

Office Locations

Americas
DarkstrikeInc
108 Wild Basin Road South
Suite 250
Austin, TX 78746

555 Fayetteville Street
Suite 300
Raleigh, NC 27601

Europe
Darkstrike AB
Kungsgatan 9
Stockholm
SE-111 43
Sweden

::: IMPORTANT NOTICE :::

Detailed technical documents can be a roadmap to an attack surface. At Darkstrike™, we prioritize data security and purposefully limit publicly available information to reduce attack surfaces and protect our customers. For access to detailed specifications and documentation, you must complete the New User Registration Form. Requests are evaluated and approved based on our client onboarding standards to ensure the highest level of security and integrity.

Attack Surface Roadmap

What is Darkstrike?

The world’s fastest most unconditionally secure data platform for any use case.

Why does this matter?

Protecting data and surfacing instantaneous intelligence from data is the cornerstone of all decision-making.

Why do we have two data platforms?

Not every use case requires a DLT. At Darkstrike™, we focus on aligning the right technology with each use case. Our distributed database, QBase™, and decentralized blockDAG, QBlock™, are designed to deliver this tailored alignment. Most of the services outlined below are available as standalone solutions to meet diverse needs.

What cloud environments are you connected to?

Architecture is cloud-agnostic. At present, our products and services connect to AWS.  Azure and GCP are forthcoming.

What programming language do you use?

Our core architecture is written in Go.

What version of TLS are you running?

TLS 1.3 with CRYSTALS-Kyber & CRYSTALS-Dilithium.

CLI

A command-line interface (CLI) tool enables you to scaffold, develop, test, deploy, and manage Darkstrike™ applications and infrastructure directly from the command shell.

Integration

Below is a list of the products and services that Darkstrike™ offers with links to their supporting documentation

QBase™

QBase is an ultra-high fast, low-latency, and highly available distributed database powered by information-theoretic or computational data security, as defined by user, ransomware-proof data, data mutability, and immutable provenance and lineage.

QBase™ includes all of the following services: Quantum-Secure Encryption · Quantum-Resistant Encryption · Ransomware Protection Service · Quantum Entropy Service · Quantum Key Generation Service · Quantum KMS Service · Quantum Messaging Service · DNA Security Service‡ · Atomic Cryptography Service · Zeroization Service · zk-STARKs Service‡ · Out-of-Band Entropy · Other Proprietary Services

QBlock™

QBlock™ is a high-performance, decentralized block directed acyclic graph (BlockDAG) powered by information-theoretic or computational data security, as defined by user, ransomware-proof data, smart contracts, tokenization‡, data mutability, and immutable provenance and lineage. Hashes of all data, including its related metadata, are stored on QBlock with all data stored on our distributed database, QBase™, which enables the lowest latency, highest availability and highest throughput possible for unconditionally secured data.

QBlock™ includes all of the following services: Quantum-Secure Encryption · Quantum-Resistant Encryption · Ransomware Protection Service · Quantum Entropy Service · Quantum Key Generation Service · Quantum KMS Service · Quantum Messaging Service · DNA Security Service‡ · Atomic Cryptography Service · Zeroization Service · zk-STARKs Service‡· Out-of-Band Entropy · Other Proprietary Services

Ransomware Protection Service

The Ransomware Protection Service employs a proprietary process to restructure and replicate data across multiple nodes, regions, and environments. This data restructuring ensures that a threat actor must gain access to 100% — not 99.99% — of the restructured data and its encrypted unique identifier to access any information. The unique identifier is encrypted using information-theoretic security, while datasets are secured with either information-theoretic or computational cryptographic methods, depending on the confidentiality requirements.

This architecture effectively neutralizes a threat actor’s ability to compromise or ransom data on our network. However, any copies of data not protected under our protocols are outside the scope of protection offered by our proprietary Ransomware Protection Service and other Darkstrike™ solutions.

DNA Security Service‡

DNA Security Service leverages the DNA quaternary nucleotide structure (A, C, G, T) for encoding and encrypting data. Using quantum-secure or quantum-resistant DNA quaternary encoding powered by QRNG-generated entropy, this service significantly expands the cryptographic key space, rendering decryption, including brute-force methods, computationally infeasible. The encoding and encryption process preserves the underlying randomness and entropy of the data, ensuring cryptographic integrity. Encryption is applied at either the information-theoretic or computational level, depending on the confidentiality requirements of the dataset.

This service provides DNA encoding, encryption, decoding, and decryption but does not include DNA storage. For users requiring DNA storage, a nucleotide balancing service is available to maintain entropy and randomness prior to synthetic DNA synthesis and sequencing.

Highlights

EEG Security Service‡

EEG Security Service requires users to wear an EEG device, which captures brainwave patterns during a specific mental task. Electroencephalographic (EEG) signals are used as a secondary encryption key to lock the quantum-secure encryption and to secure the restructured and replicated data. EEG patterns are biologically unique and cannot be forged like passwords or fingerprints.

EEG signals prevents replay attacks as they change slightly every session, ensuring a new biometric key each time. Small variations in EEG signals do not prevent decryption, ensuring reliability.

  • If an adversary obtains a user’s encrypted files, they cannot decrypt them.
  • If an adversary steals an encryption key, it’s locked behind the individual user’s EEG.
  • If an adversary accesses storage locations, the data remains unreadable without the unique identifier which is locked behind the individual user’s EEG.
  • If an adversary copies an individual’s EEG, Zero-Knowledge Proofs prevent replay attacks.‡

Quantum Entropy Service

Quantum Entropy Service provides non-deterministic random for key encryption and other operations from a quantum random number generator (QRNG), which is powered by the laws of physics and quantum mechanics. All QRNG devices are successfully tested against NIST SP800-90 and Dieharder 2 series of standards.  Quantum entropy source is shot noise of the electron tunnelling through a doped semiconductor P-N junction with an on-demand conditioned entropy pool for intensive encryption operations. Our Quantum Entropy Service provides buffering and failover while adding entropy to the pool when entropy falls below configured threshold.

All of our encryption operations for QBase™ and QBlock™ utilize QRNG-derived entropy. Users can retrieve random numbers from Linux-based servers for key encryption and other operations from our online servers. Entropy can be accessed via our API.‡

nist-sp800-90b

Quantum Key Generation Service

Quantum Key Generation Service enables multiple endpoints to create encryption keys derived from QRNG random without distributing keys or QRNG random between such endpoints, eliminating key transmission and “harvest now, decrypt later” risk.  Service enables practical implementation of information-theoretic data security without key or random transmission – achieving the security of quantum key distribution (QKD) within a classical framework.

While service is primarily utilized for quantum-secure (information-theoretic security) key generation, it may be used for quantum-resistant (computational security) key generation.

Highlights

  • Service generates QRNG-derived random
  • User A and B receive random
  • User A and B generate identical keys locally without exchanging keys or random

Encryption Operations

  • Information-theoretic security: One-Time Pad
  • Computational Security: AES-256 (GCM)
  • Encapsulation: CRYSTALS-Kyber1024
  • Digital Signatures: CRYSTALS-Dilithium5

Quantum KMS Service

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Quantum Messaging Service

The Quantum Messaging Service establishes Zero Trust Trusted (ZTT) Channels, adhering to Zero Trust Architecture (ZTA) principles for secure and authenticated communication. Mutual TLS is enforced across all cluster endpoints, requiring client certificates from the same trust chain for access. ZTT Channels integrate rigorous verification protocols, adaptive access controls, and advanced security mechanisms to protect against evolving threats.

Atomic Cryptography Service‡

Atomic Cryptography Service provides atomic decryption, re-encryption, and zeroization verified by Zero-Knowledge Scalable Transparent Arguments of Knowledge (zk-STARKs)‡, ensuring that the such processes are both secure and verifiable without exposing sensitive data.

Our Atomic Cryptography Service treats the decryption and re-encryption of data as a single, inseparable operation. The goal is to ensure that the data is never left in plaintext for longer than absolutely necessary and that the operation is performed in a way that prevents intermediate exposure.

Highlights

  • Ensures decryption was performed correctly.
  • Ensures data was re-encrypted correctly without being exposed.
  • Ensures zeroization was performed to securely wipe any systems or elements that perform encryption and other operations.

Zeroization Service

Service zeroizes various systems and elements that perform encryption and other operations.

Highlights

  • Systems:
    • Cryptographic Systems
    • Memory
    • Persistent Storage
    • Networking Buffers
    • Cloud Environments
  • Elements:
    • Unused QRNG Random
    • Temporary Encryption Keys
    • Used Encryption Keys
    • Used Encryption-Related Metadata
    • Intermediate Computations
    • Deleted Plaintext

zk-STARKs Service‡

The zk-STARKs Service implements cryptographic protocols that enable a prover to demonstrate to a verifier that a computation has been performed correctly or a specific value is known, without revealing the value or underlying data. This ensures that encryption, decryption, and zeroization operations can be verified for correctness without exposing sensitive information.

Following each encryption, decryption, or zeroization operation, the service generates a unique, serialized, fixed-length cryptographically secure identifier based on zk-STARKs. This identifier encapsulates a session ID, random nonce, cryptographic context, operation purpose, and timestamp, ensuring traceability and verifiability while maintaining data confidentiality.

Highlights

  • Verification Service confirms event occurred
  • If event occurred, verification algorithm determines prover commitment and sends validation to service
  • If event did not occur, task is re-run

‡ Future release.