Dyadic applies a technology called secure Multiparty Computation to enable the storage and usage of cryptographic keys without ever having them in a single place, thereby eliminating the key as a single point of failure. This is being achieved practically by splitting a key into two random shares which are then stored on distinct, separate machines with high degree of segregation.

Each of these machines has a vHSM and each machine can use the cryptographic API that allows only encryption, decryption and signing. Key material export is impossible, as neither of the machines ever hold the key.

How does it work?

  • number_1






At the core of Dyadic’s vHSM technology lies cutting-edge technology based on decades of advanced cryptographic research in secure multiparty computation (MPC).

It's not magic. It's math.

  • Get an in-depth knowledge of how Dyadic uses MPC to secure keys with mathematically proven security guarantees. Learn what makes multiparty computation (MPC) protocols secure and how this is determined.

    Get the whitepaper >

  • Dyadic uses MPC to secure private keys, but did you know MPC has many other real world uses? Watch this on-demand webinar and find what these things have in common. Appropriate for MPC fans of any level!

    View Recording >