2. On Average, every data breach
costs a company $3,9 mln
Datatheft is common practice
Every second, 44 personal
records are being stolen
Cyber warfare is a growing
concern for governments
2
3. Add a second layer of security
Using a biological process
Folding data into proteins; accessed only by the respective user
Offsets any potential damage that would derive from a breach
Vital data unusable for unauthorized actors
How are we going to change this?
3
private and state-sponsored cyber crime
protecting your intellectual property
4. original message
Folding Process
Computational alogrithmc
Using a protein database
4
«Il nostro progetto si chiama biography e mira a
sviluppare un nuovo approccio crittografico utilizzando
la struttura terziaria delle proteine come vettore
dell’informazione»
Mind blowing:
The possible combination of
a 64 characters Bio-Graphy
message are more than the
total amount of atoms in
the entire universe.
5. Quaternary protein structure
Possible applications:
message, database and
identification
Application
of Method
5
c
c
Main field of application:
Folder and file encryption
(e.g. blueprints)
6. Governmetal Agencies
Military / Defense
Medium and LargeCorporations
Implementation for securing medical
data or credit card information
Key
Customers
6
Licensing process to companies
Sell unique database to particular customers
Maintainance of software
Revenue
Generation
Creating and Capturing Value
7. Market and its
Barriers to Entry
Creation of basis for
encryption needs
HPC
...
rental is expensive;
alternative mvp
database can be
generated within
monthsHPC: High Performance Computing:
Google Cloud TPU from $24/h or $136k/year
Depending strongly
on performance of
our process (trust)
...
ho w to achive
reputation/ trust in
competitive
market?
7
High Start-up
cost
Brand
Recognition
Encryption Software
Market
Expected growth: ~16% CAGR
Expected market size:
estimate 1: $2.5 bn in 2021
estimate 2: $16.5 bn in 2024
8. Competitive
Advantage Computational demand to hack
Common PC not able to conduct
unfolding of proteins, raising the bar for
adversary actors
Superiority in # combinations
20n combinations of folding a protein are
possible
Just a short plaintext of 60 characters has
as many possible combinations as the
advanced encryption standard
AES (256-bit)
n = number of characters in a plaintext
n = 33.000 can be reached
over direct competition –
encryption standards
(AESand RSA)
8
Did you know? Accessing only parts of an
encrypted information is not possible with the
current encryption standards.
9. 9
Financial Projections for 2020
Sources of funding:
Academic fundings
Generated revenue through trials
Projected: 25.000 €
Private investment (Partnership)
(depending on investment model)
Arrising costs:
Acquisition of licenses:
Rosetta license for Beta version ~ 5.000€
Additional Staff:
software developers: 24.960 €
Marketing & Sales:
cost related to travel expenses,
participation to fairs and website: 22.000 €
Patents – if deemed necessary:
EU patent 7.320 € / International patent 9.150 €
Base for final software product
Road to 2020 including Beta
software and creation of
partnership
10. Timeline and Expert support
Feedback and Support from… Prof.M.Vendruscolo
(UniversityofCambridge)
10
Prof.Colombo
UniversityofPavia
ComputationalBiochemestry
Prof. F. Forneris
UniversityofPavia
StrucutralBiology
„Èun‘idea tanto rischiosa quanto
originale. Por questo avrà successo“
MVP protein
base with
Rosetta
mid Q2 2020
Prof. F. Roli
(University of Cagliari)
Testing of
database
and matching
end Q2 2020
Partner search
and negotiations
Q4 2020
Own, indepen-
dent database
Q4 2021