About Claveo

The Claveo Project

The Claveo Project Group was initiated by Dr. Çetin Kaya Koç, a leader and visionary in cryptographic technology, who had made significant contributions to several cryptography and security products that have been in the marketplace since the 90s, including PGP, BSAFE, and CDSA. Dr. Koç is the co-founder of the Workshop on Cryptographic Hardware and Embedded Systems and the editor-in-chief of the Journal of Cryptographic Engineering, published by Springer. He has published 10 books, 13 US patents, and more than 120 journal and conference papers. Dr. Koç is a Fellow of IEEE and received his Ph.D. from University of California Santa Barbara. [Koç is pronounced as "Coach"]

The Claveo Project Phase 1

The primary purpose of the Claveo Project was to develop secure authentication technologies that:

  • are somewhat transparent to the user,
  • are based on strong cryptographic (RSA & AES) algorithms,
  • utilize certain properties of mobile phones, such as physical uniqueness.

The Claveo Project Phase 1 proposal received an NSF SBIR award in 2012, and a demo project was developed using the funds from this source. The demo was intended to show that a user can more securely login to her electronic bank account with the help of the Claveo Protocol, running between the Bank's Server, the Claveo Server, and the Claveo Mobile App running on the user's smart phone.

The current focus of the Claveo Project Group is on the architectural, cryptographic, and usability properties of general-purpose authentication protocols.

The Claveo Project Phase 2

This second phase of the Claveo Project started in March 2015. The Claveo Project Phase 2 aims beyond the simple user-server-phone communication paradigm. We are now developing much stronger and more flexible versions of authentication technologies that:

  • are completely transparent to the user,
  • are spontaneous, i.e., works without external stimuli,
  • are based on strong elliptic curve cryptograpy,
  • utilize several properties of participating mobile & wearable devices and tokens.

The protocol relies on computational and physical properties, such as: Presence or Nearness, Active or Passive Participation, Physical Uniqueness, and Cryptographic Engine. As new protocols are developed and their implementations are realized, we will publish technical reports and create demo applications, and announce them in this web site.

Contact Us

Dr. Çetin Kaya Koç
1100 Mission Canyon Road
Santa Barbara, California 93105
+1 805 403 4191