To be the supplier of choice of the most innovative, reliable, and cost effective security software, firmware, and services solutions for government agencies, prime contractors, and enterprise; meet customer's future needs and requirements; continue on-going research; and do rapid deployment of updated technology.
EndoSec specializes in products for hardware intrinsic security and cryptography plus services for security design and AT planning.
EndoSec was founded by security professionals with over 100 years of combined experience supplying products and services to the Aerospace and Defense industry.
EndoSec LLC has it’s home office in Washington, DC and satellite offices in Virginia, Indiana and California. We are a 100% US owned and operated company and are a Veteran Owned Small Business. Our employees are US Citizens.
Mr. Moriarty utilizes his 28 years of business, technical, legal, DoD, and military experience to build strong teams and lead them to success. Mr. Moriarty is an Operation Iraqi Freedom Veteran and Colonel in the United States Army Reserve. During his military career, Mr. Moriarty has served in various senior and command leadership positions focusing on large-scale security and warfare logistic missions. Over his 28-year military career, COL Moriarty has received extensive military training in Logistics, Operations, and Combat Readiness. Mr. Moriarty has held executive level positions in finance, operations, project management, and business development at Covansys and Shanley & Fisher (currently Drinker, Biddle & Reath LLP) in New York for thirteen years. He is a focused and dedicated leader who understands the complexity of the anti-tamper mission and the related technological requirements. Mr. Moriarty is a SAP certified Functional Consultant, received his MBA from the University of Hartford, and received a BS from the University of Iowa.
Mr. Jackson holds degrees in Mathematics and in Computer Engineering from the University of Alabama in Huntsville, AL, and is currently a Ph.D. candidate at Purdue University studying Algebraic Geometry and String Theory. He also has worked in the defense industry for over six years as a research scientist. Mr. Jackson's extensive work in cryptography, cryptologic mathematics, security proofs, threat analysis, and leakage based cryptanalysis is well respected in the defense and Anti-Tamper (AT) community. His algorithms have been deployed in many AT systems and he has conducted threat analyses and provided security models for many agencies within the Department of Defense (DoD) and Department of Energy (DoE).
Andrew Ursitti is a cryptologic mathematician at EndoSec. A former blackjack and craps dealer, Andrew is a mathematics and computer science enthusiast who brings an expertise in the technical details of contemporary cryptography and the desire to help customers meet highly customized security reqirements. Andrew holds B.S. and M.S. degrees in mathematics from the University of Connecticut and is currently a Ph.D. student in mathematics at Purdue University.
Mr. Webb retired on 30 Nov 2010 as Chief Scientist from The Boeing Company after 42+ years experience with military programs. He worked in the Advanced New Product Development Group in St. Louis, Missouri. In that position, he had interactions with many government organizations including the Under Secretary of Defense for Acquisition and Technology - Executive Committee, Low Observable/Counter Low Observable activities, and Anti-Tamper concepts and designs including Air Force, Navy and Army Executive Agents and the Secretary of the Air Force International Affairs in the Pentagon and Washington, DC area.
Tom has over 42 years experience with training and logistics operations. He retired from the United States Army as a major general in 2010 after 37 years of service. He commanded units at every level from company to theater support command. Tom had two senior level logistics commands as part of Operations Enduring and Iraqi Freedom in the southwest Asia theater. He has since been consulting within the defense industry. He has worked in anti-tamper and cryptography sales and service since 2011. Tom services all eastern United States accounts. Tom has MS and BS degrees from North Carolina State University. He is also a graduate of the United States Army War College. He resides in the metropolitan DC area.
Matt graduated from Purdue University with a Bachelor's Civil and Environmental Engineering. He is currently working on a Masters in the College of Agriculture at Purdue in a lab that specializes in remote sensing, signal processing, and enviromental modeling. Matt specializes in data visualization and web based tool development for big data analytics. He also is an full stack web and Android platform developer. As part of his research he has traveled around the work documenting his team's research as the team field photographer, GoPro filmer, timelapse video recorder, and drone flying specialist. I am also an amateur architect former Japanese restaurant owner and has a black belt in Judo.
EndoSec specializes in creating robust implementations of cryptographic algorithms which are resistant to a number of advanced attacks. Our algorithms are typically available in both firmware and software. Firmware cores are ready for implementation in silicon.
EndoSec Encryption products are NIST/NSA Suite B (Vanilla Algorithms) that support:
All of the NIST/NSA Suite B algorithms are available as standard cores, high speed variants, or 'secured'. We can custom tailor the cores to the specific application.
The EndoSec 'hardened' cryptographic modules consist of additional techniques to protect from advanced attackers. EndoSec has baseline algorithms that are easily adjusted to fit customer's needs: speed vs. security vs. gate usage.
The EndoSec cores work well in all ASIC and FPGA parts and are customized to fit each target and exploit the resources in the most useful way.
All the above modules were developed by EndoSec using US Citizens and Cleared personnel.
EndoSec is a Government, Aerospace, and Defense reseller for Intrinsic ID USA. Intrinsic ID is the world pioneer and leader in Physically Unclonable Function (PUF technology) security IP cores using its patented Hardware Intrinsic Security technology(tm) (HIS). Originated from Philips Research, Intrinsic ID has established itself as a leading provider of strong security solutions for combating digital security hazards worldwide.
Intrinsic-ID has developed an efficient and highly secure key storage solution. This is accomplished through Hardware Intrinsic Security or HIS technology. HIS represents an innovative and system-wide design methodology for deploying a key storage solution founded on Physically Unclonable Functions or PUFs.
Intrinsic-ID's HIS products take PUFs to the next level in security. They overcome several weaknesses of traditional embedded key storage technologies. They come with integration guidelines depending on the security level that is required. Intrinsic-ID's HIS products are implemented in ICs that are target for security evaluations. HIS technology has been extensively tested and approved by security experts at major entities, such as Philips, Thales, SiVenture, NXP, Microsemi, and a major US defense contractor. So far, no successful attacks have been reported. Immunity against sophisticated attacks and successful evaluations by major entities show that HIS-based products are ready for adoption in high security systems.
Using Quiddikey(c) a software image is bound to a specific device using its intrinsic security elements hidden in the hardware and a revolutionary approach based on a secure implementation of Physically Unclonable Functions (PUFs) called Hardware Intrinsic Security(tm). This can be achieved with device unique random keys as well as with a global protection key.
Quiddikey(c) is the sole and unique security solution in the market which dynamically reconstructs the on-chip secret key used for secure file and software decryption without ever storing that key. This means that the key is not present on the device when it is powered off, but generated on-the-fly using Hardware Intrinsic Security (tm) every time it is needed. It defeats the most advanced invasive hardware attacks on the key itself by simply not storing it.
PUF Is Ideally Suited To Provide Root Of Trust
Quiddikey provides Root of Trust security to the highest level of trust.
Quiddikey is a flexible hardware key storage solution that does not store the key but reconstructs it on-the-fly from the internal hardware intrinsic properties of the device. In this way Quiddikey provides a totally flexible, low cost and efficient secure boot solution for Flash based systems.
Copying the Quiddikey generated activation code from one device to another results in a non-functional device since the data extracted from the chips of another device do not match with this activation code and will result in the wrong key being reconstructed, thus protecting such systems against cloning and counterfeiting attacks simultaneously.
For more details on the products, above, click on the following link: Intrinsic Product Details
Security decisions can affect your systems for years to come. Our security engineering services enable you to feel more confident about the actions you take to secure your systems.
EndoSec has decades of experience advising companies. We can help you create a robust security environment with services that include current and emerging threat assessments, policy review and development, and master planning.
There are many components to protecting intellectual property. By looking at your security challenges from several vantage points, our security specialists can help you better prevent, plan for, and respond to threats.
PUFs are innovative circuit elements but are on their own not sufficient to protect a system's security. They need to be integrated properly into a security product. Building a security product encompasses much more than simply adding functional blocks. Extreme care must be taken when designing such a product and integrating its components. Any addition to a system may introduce weaknesses if it is not done in a professional, secure and savvy way. The HIS methodology is based on years of research and development, and encompasses among other things the design choices for the PUF itself, innovations, optimizations and protective measures for the key generator, as well as system-wide guidelines for implementing and integrating a HIS design into a product.