Computing on data while it remains encrypted is a critical step in assuring privacy and integrity that complements and enhances encryption in transit and encryption at rest. We make such computation practical.
Galois has a passion for offering assurance about cryptographic solutions. We revolutionized the way people specify, verify, and implement crypto algorithms and protocols, and provide languages and tools widely used for these purposes in the intelligence community.
Galois has extensive experience in cryptography, working with the intelligence community and others. Our work in performant multi-party computation is leading the industry toward practical application of the new technologies in this area. Our long and successful track record in specifying, implementing, and verifying crypto algorithms such as elliptic curve families puts us in a leadership position for assuring cryptographic solutions, both in software and hardware.
The Galois team brings to bear significant expertise in implementing, verifying, and optimizing cryptographic algorithms and crypto protocols. We develop implementations of crypto algorithms optimized for specific performance trade-offs and in specific programming languages. We develop custom implementations of cryptographic protocols to fit specific needs.
We combine crypto expertise from our partnerships with the intelligence community and formal methods techniques in computer science such as static analysis and equivalence checking to provide high levels of assurance that real-world crypto is done correctly. Our rigorous approach enables confidence in correctness during the process of making performance and space trade-offs in crypto solutions.