We know how to protect sensitive data from breaches, distortions and spoofing.
One of the most important problems for society, business, and state is the uncontrolled increase of unprotected personal information that can be misused by criminals. An individual accumulates more and more personal data each year that can be measured in megabytes; a business — in gigabytes; a state — in terra- and petabytes. These data need to be secured, safely stored, and protected from breaches, distortions, spoofing using reliable authentication, and identification procedures. Alongside with securing personal data, information and data channels must be protected in such fields as robototechnics, driverless cars, smart houses, IoT. The humankind has the desire to automate all processes, and the question about securing such processes from external interventions becomes vital.