8000 IronCore Labs · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
@IronCoreLabs

IronCore Labs

Helping apps keep data safe with application-layer encryption

ironcore banner

Welcome to IronCore Labs - Makers of Data Security for Cloud Applications 👋

IronCore Labs makes usable, searchable application-layer encryption that helps developers and security teams lock down their sensitive cloud and AI data without the downsides.

The application-layer encryption platform

The IronCore SaaS Shield platform helps encrypt and manage data, regardless of data store, taking care of all of the difficult concerns of security, scalability, key orchestration, and smokin' fast performance. Together with Cloaked Search and Cloaked AI, it keeps that data usable, findable, and secure even from the servers and services that hold the data.

For SaaS apps, supports per-tenant encryption and key management with options for BYOK/HYOK, real-time audit trails direct to customers, and more. It can connect to all of the major KMSes with per tenant keys. And no sensitive data flows through IronCore, ever.

Groundbreaking AI data protection

IronCore's Cloaked AI product uses property-preserving encryption that maintains the distance relationships between vectors while encrypting them, allowing organizations to perform nearest neighbor searches, clustering, and anomaly detection over encrypted AI data and to build models over encrypted embeddings that require a key to use.

The encryption technique is based on the paper, "Approximate Distance-Comparison-Preserving Symmetric Encryption" by Georg Fuchsbauer, Riddhi Ghosal, Nathan Hauke & Adam O'Neill, and utilizes the scale and perturb algorithm, which randomly adds noise and redistributes vectors while preserving relative distances. Read more about the security of AI embeddings.

Play: Cloaked AI Demo

Explainers

Graphics and Text

Videos

Open source repos

We believe in transparency and we talk openly about our choice of algorithms and our implementations. Most of our source code is open source and we invite security and crypto researchers to check it out.

Note: the open source licenses are mostly AGPL so if you plan to use it in commercial or non-GPL software, you'll need an inexpensive commercial license.

SaaS Shield

Our client libraries are open source and can be found in our per-language tenant-security-client repos:

We have a public demo application showing SaaS Shield with our S3 Proxy, Cloaked AI and Cloaked Search.

Cloaked AI

We're in the process of building out a single unified library that generates interfaces for various languages. It has most of the functionality of the tenant-security-clients and also contains all of the Cloaked AI vector encryption functionality.

That's all in our ironcore-alloy repo, which is written in Rust and is currently published to:

Java Kotlin Python Rust

Cloaked Search

We have a public repo that lets anyone quickly get started using a docker container and test data: Try Cloaked Search.

We also have public benchmarks and published approaches to performance testing: Cloaked Search Perf.

Data Control Platform

The Data Control Platform (DCP) lets developers build access controls directly into their data, regardless of where it's stored. It is particularly good for end-to-end encryption use cases.

This platform uses a proxy re-encryption algorithm (we call it transform encryption in our docs) to encrypt to a public key, then delegate decryption rights to other public keys. DCP enables the ability to encrypt to a group key and have group administrator(s) add or remove members at any time, effectively granting and revoking access to data that's encrypted to the group's public key.

The details can be found in the ACM paper Cryptographically Enforced Orthogonal Access Control at Scale.

The key libraries are audited and we have extensive documentation.

  • Command line tools
    • ironhide -- command line tool for encrypting files to groups or users; can be used by anyone
    • ironoxide-cli -- command line interface for IronOxide functions to create users, devices, and groups; used by developers and admins
  • High-level crypto libraries (these use recrypt)
    • ironoxide -- rust library for interacting with the proxy re-encryption service! Rust
    • ironoxide-swift -- swift bindings for ironoxide for iOS Swift
    • ironoxide-swig-bindings -- bindings to ironoxide for Java, C++, and android
    • ironoxide-scala -- bindings to ironoxide for Scala Scala
    • ironnode -- node library for interacting with the proxy re-encryption service TypeScript
    • ironweb -- web browser library for interacting with the proxy re-encryption service TypeScript
  • Low-level crypto libraries
    • recrypt-rs -- proxy re-encryption / transform cryptography library in rust (audited, constant time)
    • gridiron -- constant time big number math library used by recrypt-rs
    • recrypt -- proxy re-encryption / transform cryptography library in scala (audited, not constant time)
    • recrypt-wasm-binding -- build recrypt-rs for use in browsers
    • recrypt-node-binding -- build recrypt-rs for use in node

Other

Community

IronCore Lab's community is a great way to contribute knowledge, learn, and otherwise participate in bringing better data security and privacy to apps.

  • Discord server -- Get help, ask quick questions, show off your work, and get to know other IronCore Labs users.
  • Forums -- Post feature requests, report bugs, ask questions, and have in-depth discussions about privacy and security.

About us

IronCore Labs is a pioneering force in data privacy with proven security for AI data, cloud data, and encrypted search.

Founded in 2015 and headquartered in Boulder, Colorado, the company focuses on making application-layer encryption a pattern that is adopted by everyone to improve the security of all of us.

Pinned Loading

  1. recrypt-rs recrypt-rs Public

    A set of cryptographic primitives for building a multi-hop Proxy Re-encryption scheme, known as Transform Encryption.

    Rust 158 20

  2. ironhide ironhide Public

    Tool to easily encrypt and decrypt files to users and groups. Similar to GPG, but usable at scale.

    Rust 52 6

  3. try-cloaked-search try-cloaked-search Public

    Quick start for IronCore's encrypted Elasticsearch proxy

    Shell 16

  4. community community Public

    IronCore's Public Community

    3

  5. ironcore-alloy ironcore-alloy Public

    A unified SDK for IronCore encryption operations including vector encryption for AI data

    Rust 11 3

  6. ironoxide ironoxide Public

    Rust SDK for IronCore's Data Control Platform for end-to-end encryption

    Rust 11 3

Repositories

Showing 10 of 59 repositories

Top languages

Loading…

Most used topics

Loading…

0