Cybersecurity

INES, a new symmetric cryptography algorithm

The widespread adoption of cloud computing exposes data, flows, and systems: major cyberattacks have become commonplace. In this context, cybersecurity can no longer be considered an add-on, but rather an intrinsic property of digital architectures. It is within this framework that INES (Intelligent Network Encryption System) has been developed, polymorphic symmetric cryptography technology, it is designed to ensure the protection of data and flows in open, distributed environments subject to strong operational constraints. 

Our approach was to imagine an Enigma machine whose rotors spin randomly, capable of resisting any form of decryption relying on brute force and statistics. And to develop INES, the decision was made to start from the fundamentals: the work of the German school of mathematics (Göttingen).

Our research draws its inspiration from:

– The Enigma machine (marine version) and Alan Turing's work on finite state machines

– Riemann's work on the distribution of prime numbers: «"The non-trivial zeros of the Zeta function are distributed on the complex line with real value ½.".

The algorithm therefore relies on dynamic and random mechanisms capable of evolving the encryption conditions to render brute-force decryption attempts ineffective. This approach makes it possible to efficiently encrypt large volumes of data while maintaining performance compatible with high latency and throughput requirements.

INES' design principles align with the challenges of post-quantum cryptography (CPQ), minimizing exposure to the vulnerabilities of asymmetric cryptographic models. Its dynamic approach ensures security without requiring hardware acceleration, offering significant flexibility in constrained environments.

About INES

Some figures

Our solutions

The security solutions developed by JLME are based on a thorough understanding of digital architectures and the real-world constraints of systems. They are designed to address the challenges of data and network protection in environments where performance, availability, and scalability are inseparable from security.

INES forms the technological core of these solutions. It is integrated within Protect Following, a coherent set of cybersecurity solutions covering:

This approach makes it possible to protect sensitive data throughout its lifecycle, whether stored, exchanged or processed, without compromising the operational use of systems.

INES is an interoperable technology that can be deployed in third-party solutions.

Our training programs

Mastering cybersecurity technologies relies as much on tools as on skills.
JLME supports the upskilling of teams through cybersecurity training and on internally developed solutions.

These training courses are part of an approach to transmitting technical fundamentals, understanding protection mechanisms and appropriating secure architectures.

JLME is a Qualiopi certified training center, guaranteeing a structured and recognized framework.

Engineering

JLME's engineering consultancy activities are based on a demanding engineering approach, founded on confidentiality, creativity, and commitment. Our expertise ranges from the design of secure networks from scratch to providing support in selecting cybersecurity solutions or infrastructures that closely match your needs.

«"Say what you do and do what you say" is our mantra: transparency is the foundation of our approach. Projects are conducted within a framework that guarantees strict confidentiality and business secrecy, a prerequisite for the successful execution of a project.

Each project is based on a tailored approach, adapted to the context, technical and budgetary constraints, and project objectives. This ability to listen allows us to propose coherent architectures and solutions, aligned with operational realities and long-term challenges.

Whatever the nature of the studies carried out, our commitment is total and is reflected in continuous involvement, from the initial analysis to the support of the implementation and operation phases.

Our observation of technological changes has shaped our expertise for over 20 years and guarantees our clients disruptive solutions.

Our ecosystem

JLME operates within a cybersecurity ecosystem based on collaboration, the sharing of expertise, and the development of technological solutions with national and European reach. This environment provides an essential framework for designing credible responses to the challenges of digital sovereignty and the protection of critical infrastructure.

Our involvement in Systematic Paris-Region, the European Deep Tech hub, is part of this collective dynamic. It fosters networking among industrial, technological, and academic players, as well as the emergence of collaborative projects serving European strategic challenges.