The BCDiploma algorithm: a cryptographic response to the issue of on chain personal data, by L. Flament, Cryptographic Advisor

Ludovic Flament

Ludovic Flament

Founder of Cryptograph’IC
Cryptographic Expert
Expert in secure communication protocols
Elliptical curves specialist

What’s Cryptograph’IC DNA?

Cryptograph’ IC specializes in the design and implementation of cryptographic algorithms, secure communications protocols and PKI solutions. Our clients include French ministries and major accounts (ING, Imprimerie Nationale, Morpho, PMU) and innovative SMEs (Stormshield, Sentryo, WolfSSL — USA, IDQuantique — Switzerland, CryptZone — Sweden). Cryptograph’ IC also assists its publishing clients in the certification of their products: Common Criteria, CSPN, FIPS,…

What are the key concepts of the BCDiploma algorithm?

The BCDiploma algorithm is used to encrypt the data of the diplomas that higher education institutions store on Ethereum, thanks to the smartcontracts of BCDiploma. At the outset, BCDiploma has decided to provide a cryptographic answer to the question “how to reconcile the right of personal data with blockchain?” Its algorithm meets an ambitious set of specifications:
  • Make the graduate responsible for sharing his or her degree;
  • Make the data non-collectable;
  • To make possible the “right to forget”;
  • Enable schools to comply with the GDPR;
  • Make it impossible for the solution operators to use personal data;
  • Ensure the highest possible level of safety.

What is the architecture of the BCDiploma algorithm?

BCDiploma guarantees institutions and diploma holders that data on Ethereum is encrypted and can be read only with possession of all three keys thanks to algorithm AES_256_GCM. Since the AES recommends uses exceeding 2030 with a size of key of 128bits, BCDiploma’s 256-bit key guarantees one of the safest encryption processes on the market.

What is the singularity of the BCDiploma algorithm?

Based on a symmetrical encryption algorithm, the encryption key is not stored in any place. It is generated when necessary by assembling and derivating the three shared keys, each of which has a specific role: the key of the graduate, the key to persistence, the permanent key of the institution.

The BCDiploma algorithm meets the constraints and expectations of administrative registers of personal data. As such, Blockchain Certified Data has a solution that allows us to consider a wide variety of uses.

Ludovic Flament

Come talk to us! Telegram