MIRACL guarantees the identity integrity of people, apps and things needed to run a digital business.

people-app-things-1.png

By eliminating today's outdated security infrastructure including passwords, root keys and stored credentials – we enable billions of digital transactions to be unleashed while ensuring the integrity of every person, device, or component on tomorrow's web.

Global Distribution Partners
These Global Technology leaders distribute MIRACL’s identity integrity as a service platform.

logo-dimension-data-sized.png
logo-experian-sized.png
logo-nttsoft-sized.png
logo-ntt3-sized.png

OEM Customers
These Global Technology leaders use MIRACL cryptography in their platforms.

logo-google-sized.png
logo-microsoft-sized.png
logo-intel-sized.png
logo-gchq-sized.png
logo-usaf-sized.png
logo-arm-sized.png
logo-bae-sized.png
logo-gemalto-sized.png
logo-tencent-sized.png
logo-siemens-sized.png
logo-toyota-sized.png
logo-panasonic-sized.png
logo-bosch-sized.png
logo-garmin-sized.png
logo-lsi-sized.png
logo-hitachi-sized.png

Join the movement to the new paradigm for identity integrity, Apache Milagro (incubating).

logo-milagro-sized.png

MIRACL is an open source company, and proudly contributes to these organisations and foundations:

logo-hyperledger-sized.png
logo-apache-sized.png
logo-fido-sized.png

News and Updates

1 Nov 2016

A Note on the Implementation of Format Preserving Encryption Modes

The American National Institue for Standards in Technology (NIST) is considering ...

Read full article

25 Oct 2016

Ed3363 (HighFive) – An alternative Elliptic Curve

  We propose a new Elliptic curve at a security level significantly greater than the ...

Read full article

19 Oct 2016

MIRACL Enables Security Solution and Managed Service Providers to Meet Strong Authentication Needs of Businesses in Regulated Industries

New Service Adopted by NTT Software to Expand Offerings While Eliminating the Largest ...

Read full article

17 Oct 2016

Key-Escrow-less M-Pin

We have been tasked to harden the M-Pin protocol against a “key-escrow” attacker, who has ...

Read full article

10 Oct 2016

Using M-Pin with Geo-location/Geo-fencing

M-Pin is a Multi-Factor identity based authentication protocol. Secret authen-tication ...

Read full article

3 Oct 2016

Migrating SOK to a type-3 Pairing

The non-interactive authenticated key exchange protocol known as SOK after its inventors ...

Read full article