Personal data is processed on our website through cookies and certain cookies are used for the presentation of information society services, other cookies will be used only to provide ads/marketing tailored to you, the improvement of our website and personalization (storing your preferences for your next visit to the website asides from your privacy choices) if you provide open consent. It is possible for you to manage your cookie preferences via a panel, to reach the enlightenment text: Click Here
Contact

We bring together applied and world-renowned theoretical cryptographers in the InterProbe Crypt R&D Center. We can design, analyze and implement customized cryptographic protocols and algorithms. We also develop tailor-made product-based cryptographic solutions and provide their maintenance services.

Our areas of expertise are post-quantum cryptography, blockchain, re-engineering, binary analysis, lightweight cryptography, cryptographic protocols, and cryptanalysis. Our cryptography experts research symmetric, asymmetric, post-quantum cryptography, cryptanalysis methods, and their practical implementations. We also benefit from artificial intelligence to enhance our capabilities. Our mission is not only to supply cryptographic solutions but also to develop solutions tailored to meet customer-specific needs within the scope of collaborations.

We provide services on,

Privacy is a fundamental property required of many cryptographic primitives and protocols. Our solutions range from developing data privacy schemes to encrypt personal data to customizing signature algorithms to meet user privacy needs. We have provided and continue to provide encryption and digital signature solutions in varying strengths and contexts.
The diversity of topological structures also affects security needs. Unique security structure designs meet these needs. Our team carries out protocol design by making use of key distribution, transfer, and authentication. Thus, we ensure the confidentiality of information. Moreover, protocol designs can be symmetrical, asymmetrical and post-quantum based according to the system requirements.
The advent of large-scale quantum computers will compromise much of modern cryptography, which is instrumental in ensuring cybersecurity and privacy of the digital transition. The standardization of post-quantum cryptography algorithms is getting closer to completion. Any cryptographic primitive based on the integer factorization and/or the discrete logarithm problems will be vulnerable to large-scale quantum-powered attacks. The digital data/products/systems that derive their security ultimately from the abovementioned primitives will be compromised. Also, they must be upgraded -including their replacement when needed- to quantum-resistant cryptography. With the InterProbe consultancy service, you can make your products resistant to quantum attacks. In addition, with our consultancy service to be provided, you can make your product suitable for current studies without any disruption to your product.
One of the essential parts of cryptographic applications is the correct generation of keys and maintaining this generation. It is mandatory to test cryptographic devices, random number generators producing seeds, private keys, etc., which meet the international standards so they do not threaten information security. We provide random number generators that generate the key according to your needs by the standards. We also provide a statistical test suite integrated with an evaluation mechanism to test the randomness of cryptographic modules. According to the intended significance level and coverage, we can modify statistical test suites preserving the independence of the tests included.
We perform security analysis of deployed cryptographic protocols. Using cryptographic weaknesses in the literature, we develop software solutions that take advantage of these weaknesses. We create optimized rainbow tables and implement time-memory trade-off (TMTO) attacks to the targeted protocols. Password recovery methods are also developed by machine learning (ML) and deep learning (DL) based on dictionary creation and password generation taking into account the characteristics of target languages.
Binary analysis is a type of code review that looks at files consisting of binary code and evaluates their content and structure without needing access to the source code. Binary code analysis is binary code level threat assessment and vulnerability testing. We can analyze the raw binaries that make up a complete application, which is especially helpful when there is no access to the source code.
Identifying that a given binary program implements a specific cryptographic algorithm and finding out more information about the cryptographic code is a significant problem. In the absence of source code, we have the ability to reverse engineer and perform binary analysis of unknown file formats. We also advise in this area to analyze third-party libraries, providing richer analysis and better visibility into how applications interact with libraries.
Cryptography training by InterProbe covers symmetric and public-key cryptography, post-quantum algorithms, and attack methods. This training is essential for institutions working in information security and developing products in this field.
At the end of the training, the participants will have acquired competent skills in cryptography algorithms, cryptanalysis methods, and efficient implementation methods. With the insights and knowledge gained through this training, it is ensured that experts in the field will have a competency to internalize the details they need to know. They will use the relevant information effectively.