SlideShare a Scribd company logo
Roberto Tinelli
Lorenzo Rossi
Michele Mascherpa
Alessia Pisano
Maximilian Kullmann
Christian Knoll
Biological Cryptography
Bio-Graphy
1
On Average, every data breach
costs a company $3,9 mln
Datatheft is common practice
Every second, 44 personal
records are being stolen
Cyber warfare is a growing
concern for governments
2
Add a second layer of security
Using a biological process
 Folding data into proteins; accessed only by the respective user
 Offsets any potential damage that would derive from a breach
 Vital data unusable for unauthorized actors
How are we going to change this?
3
private and state-sponsored cyber crime
protecting your intellectual property
original message
Folding Process
Computational alogrithmc
Using a protein database
4
«Il nostro progetto si chiama biography e mira a
sviluppare un nuovo approccio crittografico utilizzando
la struttura terziaria delle proteine come vettore
dell’informazione»
Mind blowing:
The possible combination of
a 64 characters Bio-Graphy
message are more than the
total amount of atoms in
the entire universe.
Quaternary protein structure
Possible applications:
 message, database and
identification
Application
of Method
5
c
c
Main field of application:
 Folder and file encryption
(e.g. blueprints)
Governmetal Agencies
Military / Defense
Medium and LargeCorporations
 Implementation for securing medical
data or credit card information
Key
Customers
6
Licensing process to companies
Sell unique database to particular customers
Maintainance of software
Revenue
Generation
Creating and Capturing Value
Market and its
Barriers to Entry
Creation of basis for
encryption needs
HPC
...
rental is expensive;
alternative mvp
database can be
generated within
monthsHPC: High Performance Computing:
Google Cloud TPU from $24/h or $136k/year
Depending strongly
on performance of
our process (trust)
...
ho w to achive
reputation/ trust in
competitive
market?
7
High Start-up
cost
Brand
Recognition
Encryption Software
Market
Expected growth: ~16% CAGR
Expected market size:
estimate 1: $2.5 bn in 2021
estimate 2: $16.5 bn in 2024
Competitive
Advantage Computational demand to hack
Common PC not able to conduct
unfolding of proteins, raising the bar for
adversary actors
Superiority in # combinations
20n combinations of folding a protein are
possible
 Just a short plaintext of 60 characters has
as many possible combinations as the
advanced encryption standard
AES (256-bit)
n = number of characters in a plaintext
n = 33.000 can be reached
over direct competition –
encryption standards
(AESand RSA)
8
Did you know? Accessing only parts of an
encrypted information is not possible with the
current encryption standards.
9
Financial Projections for 2020
Sources of funding:
 Academic fundings
 Generated revenue through trials
Projected: 25.000 €
 Private investment (Partnership)
(depending on investment model)
Arrising costs:
Acquisition of licenses:
Rosetta license for Beta version ~ 5.000€
Additional Staff:
 software developers: 24.960 €
Marketing & Sales:
 cost related to travel expenses,
participation to fairs and website: 22.000 €
Patents – if deemed necessary:
 EU patent 7.320 € / International patent 9.150 €
Base for final software product
Road to 2020 including Beta
software and creation of
partnership
Timeline and Expert support
Feedback and Support from… Prof.M.Vendruscolo
(UniversityofCambridge)
10
Prof.Colombo
UniversityofPavia
ComputationalBiochemestry
Prof. F. Forneris
UniversityofPavia
StrucutralBiology
„Èun‘idea tanto rischiosa quanto
originale. Por questo avrà successo“
MVP protein
base with
Rosetta
mid Q2 2020
Prof. F. Roli
(University of Cagliari)
Testing of
database
and matching
end Q2 2020
Partner search
and negotiations
Q4 2020
Own, indepen-
dent database
Q4 2021
Meet the team
11
Alessia
Pisano
Lorenzo
Rossi
Michele
Mascherpa
Roberto
Tinelli
Maximilian
Kullmann
Christian
Knoll
Phone: +39 389 980 5965
Mail: Biological.Criptography@gmail.com
linkedIn: https://linkedin.com/company/bio-graphy

More Related Content

What's hot

2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
ijwscjournal
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
pijans
 
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
pijans
 
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
Michael Koster
 
Call for papers - 10th International Conference on Mobile & Wireless Networks...
Call for papers - 10th International Conference on Mobile & Wireless Networks...Call for papers - 10th International Conference on Mobile & Wireless Networks...
Call for papers - 10th International Conference on Mobile & Wireless Networks...
ijassn
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
ijdms
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
albert ca
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little Things
H4Diadmin
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
ijdms
 
Vicinity glo tsummit yajuan guan
Vicinity glo tsummit yajuan guanVicinity glo tsummit yajuan guan
Vicinity glo tsummit yajuan guan
Juan C. Vasquez
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
IJCNCJournal
 
Call for papers - International conference on networks, blockchain and intern...
Call for papers - International conference on networks, blockchain and intern...Call for papers - International conference on networks, blockchain and intern...
Call for papers - International conference on networks, blockchain and intern...
ijassn
 
Ncwmc ppt
Ncwmc pptNcwmc ppt
Ncwmc ppt
ijics
 
Granular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra RuizGranular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra Ruiz
Privacy Data Protection for Engineering
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
Privacy Data Protection for Engineering
 
13th International Conference on Wireless, Mobile Network and Applications (W...
13th International Conference on Wireless, Mobile Network and Applications (W...13th International Conference on Wireless, Mobile Network and Applications (W...
13th International Conference on Wireless, Mobile Network and Applications (W...
ijasuc
 
13th International Conference on Wireless, Mobile Network and Applications (W...
13th International Conference on Wireless, Mobile Network and Applications (W...13th International Conference on Wireless, Mobile Network and Applications (W...
13th International Conference on Wireless, Mobile Network and Applications (W...
ijasuc
 

What's hot (17)

2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
 
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
 
Call for papers - 10th International Conference on Mobile & Wireless Networks...
Call for papers - 10th International Conference on Mobile & Wireless Networks...Call for papers - 10th International Conference on Mobile & Wireless Networks...
Call for papers - 10th International Conference on Mobile & Wireless Networks...
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little Things
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Vicinity glo tsummit yajuan guan
Vicinity glo tsummit yajuan guanVicinity glo tsummit yajuan guan
Vicinity glo tsummit yajuan guan
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Call for papers - International conference on networks, blockchain and intern...
Call for papers - International conference on networks, blockchain and intern...Call for papers - International conference on networks, blockchain and intern...
Call for papers - International conference on networks, blockchain and intern...
 
Ncwmc ppt
Ncwmc pptNcwmc ppt
Ncwmc ppt
 
Granular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra RuizGranular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra Ruiz
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
 
13th International Conference on Wireless, Mobile Network and Applications (W...
13th International Conference on Wireless, Mobile Network and Applications (W...13th International Conference on Wireless, Mobile Network and Applications (W...
13th International Conference on Wireless, Mobile Network and Applications (W...
 
13th International Conference on Wireless, Mobile Network and Applications (W...
13th International Conference on Wireless, Mobile Network and Applications (W...13th International Conference on Wireless, Mobile Network and Applications (W...
13th International Conference on Wireless, Mobile Network and Applications (W...
 

Similar to Bio-Graphy pitch

PolySwarm Token Review
PolySwarm Token Review PolySwarm Token Review
PolySwarm Token Review
NKB Group
 
Introduction to new technologies
Introduction to new technologiesIntroduction to new technologies
Introduction to new technologies
Tracey Roberts
 
FESE Capital Markets Academy - New technologies
FESE Capital Markets Academy - New technologiesFESE Capital Markets Academy - New technologies
FESE Capital Markets Academy - New technologies
StephenGilmore10
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
TBledsoe
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
AliSalman110
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
Ulf Mattsson
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
Leonardo
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
IRJET Journal
 
ICT Resilience in EU
ICT Resilience in EUICT Resilience in EU
ICT Resilience in EU
Sven Wohlgemuth
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Davide Cioccia
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
Olusegun Mosugu
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp
 
Software Piracy Protection
Software Piracy ProtectionSoftware Piracy Protection
Software Piracy Protection
ijtsrd
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
Feisal Nanji
 
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEMNICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
Segment Security Services s.r.o.
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
ijtsrd
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Black Duck by Synopsys
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
TI Safe
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
Ulf Mattsson
 

Similar to Bio-Graphy pitch (20)

PolySwarm Token Review
PolySwarm Token Review PolySwarm Token Review
PolySwarm Token Review
 
Introduction to new technologies
Introduction to new technologiesIntroduction to new technologies
Introduction to new technologies
 
FESE Capital Markets Academy - New technologies
FESE Capital Markets Academy - New technologiesFESE Capital Markets Academy - New technologies
FESE Capital Markets Academy - New technologies
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
ICT Resilience in EU
ICT Resilience in EUICT Resilience in EU
ICT Resilience in EU
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
 
Software Piracy Protection
Software Piracy ProtectionSoftware Piracy Protection
Software Piracy Protection
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEMNICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 

More from polotecnologicopv

Umiles pitch
Umiles pitchUmiles pitch
Umiles pitch
polotecnologicopv
 
Shabosh pitch
Shabosh pitchShabosh pitch
Shabosh pitch
polotecnologicopv
 
Safer pitch
Safer pitchSafer pitch
Safer pitch
polotecnologicopv
 
Netabolics pitch
Netabolics pitchNetabolics pitch
Netabolics pitch
polotecnologicopv
 
Ineed pitch
Ineed pitchIneed pitch
Ineed pitch
polotecnologicopv
 
Alma Tek pitch
Alma Tek pitchAlma Tek pitch
Alma Tek pitch
polotecnologicopv
 
Tropicalina pitch
Tropicalina pitchTropicalina pitch
Tropicalina pitch
polotecnologicopv
 
Talkeeng pitch
Talkeeng pitchTalkeeng pitch
Talkeeng pitch
polotecnologicopv
 
Pharmacare pitch
Pharmacare pitchPharmacare pitch
Pharmacare pitch
polotecnologicopv
 
Jojolly pitch
Jojolly pitchJojolly pitch
Jojolly pitch
polotecnologicopv
 
Hearth pitch
Hearth pitchHearth pitch
Hearth pitch
polotecnologicopv
 
Gustavo pitch
Gustavo pitchGustavo pitch
Gustavo pitch
polotecnologicopv
 
Feedon pitch-finale
Feedon pitch-finaleFeedon pitch-finale
Feedon pitch-finale
polotecnologicopv
 
ELIO pitch finale
ELIO pitch finaleELIO pitch finale
ELIO pitch finale
polotecnologicopv
 
Lumentile pitch finale
Lumentile pitch finaleLumentile pitch finale
Lumentile pitch finale
polotecnologicopv
 
1clickfashion pitch-finale
1clickfashion pitch-finale1clickfashion pitch-finale
1clickfashion pitch-finale
polotecnologicopv
 
Cikìs - pitch finale
Cikìs - pitch finaleCikìs - pitch finale
Cikìs - pitch finale
polotecnologicopv
 

More from polotecnologicopv (17)

Umiles pitch
Umiles pitchUmiles pitch
Umiles pitch
 
Shabosh pitch
Shabosh pitchShabosh pitch
Shabosh pitch
 
Safer pitch
Safer pitchSafer pitch
Safer pitch
 
Netabolics pitch
Netabolics pitchNetabolics pitch
Netabolics pitch
 
Ineed pitch
Ineed pitchIneed pitch
Ineed pitch
 
Alma Tek pitch
Alma Tek pitchAlma Tek pitch
Alma Tek pitch
 
Tropicalina pitch
Tropicalina pitchTropicalina pitch
Tropicalina pitch
 
Talkeeng pitch
Talkeeng pitchTalkeeng pitch
Talkeeng pitch
 
Pharmacare pitch
Pharmacare pitchPharmacare pitch
Pharmacare pitch
 
Jojolly pitch
Jojolly pitchJojolly pitch
Jojolly pitch
 
Hearth pitch
Hearth pitchHearth pitch
Hearth pitch
 
Gustavo pitch
Gustavo pitchGustavo pitch
Gustavo pitch
 
Feedon pitch-finale
Feedon pitch-finaleFeedon pitch-finale
Feedon pitch-finale
 
ELIO pitch finale
ELIO pitch finaleELIO pitch finale
ELIO pitch finale
 
Lumentile pitch finale
Lumentile pitch finaleLumentile pitch finale
Lumentile pitch finale
 
1clickfashion pitch-finale
1clickfashion pitch-finale1clickfashion pitch-finale
1clickfashion pitch-finale
 
Cikìs - pitch finale
Cikìs - pitch finaleCikìs - pitch finale
Cikìs - pitch finale
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

Bio-Graphy pitch

  • 1. Roberto Tinelli Lorenzo Rossi Michele Mascherpa Alessia Pisano Maximilian Kullmann Christian Knoll Biological Cryptography Bio-Graphy 1
  • 2. On Average, every data breach costs a company $3,9 mln Datatheft is common practice Every second, 44 personal records are being stolen Cyber warfare is a growing concern for governments 2
  • 3. Add a second layer of security Using a biological process  Folding data into proteins; accessed only by the respective user  Offsets any potential damage that would derive from a breach  Vital data unusable for unauthorized actors How are we going to change this? 3 private and state-sponsored cyber crime protecting your intellectual property
  • 4. original message Folding Process Computational alogrithmc Using a protein database 4 «Il nostro progetto si chiama biography e mira a sviluppare un nuovo approccio crittografico utilizzando la struttura terziaria delle proteine come vettore dell’informazione» Mind blowing: The possible combination of a 64 characters Bio-Graphy message are more than the total amount of atoms in the entire universe.
  • 5. Quaternary protein structure Possible applications:  message, database and identification Application of Method 5 c c Main field of application:  Folder and file encryption (e.g. blueprints)
  • 6. Governmetal Agencies Military / Defense Medium and LargeCorporations  Implementation for securing medical data or credit card information Key Customers 6 Licensing process to companies Sell unique database to particular customers Maintainance of software Revenue Generation Creating and Capturing Value
  • 7. Market and its Barriers to Entry Creation of basis for encryption needs HPC ... rental is expensive; alternative mvp database can be generated within monthsHPC: High Performance Computing: Google Cloud TPU from $24/h or $136k/year Depending strongly on performance of our process (trust) ... ho w to achive reputation/ trust in competitive market? 7 High Start-up cost Brand Recognition Encryption Software Market Expected growth: ~16% CAGR Expected market size: estimate 1: $2.5 bn in 2021 estimate 2: $16.5 bn in 2024
  • 8. Competitive Advantage Computational demand to hack Common PC not able to conduct unfolding of proteins, raising the bar for adversary actors Superiority in # combinations 20n combinations of folding a protein are possible  Just a short plaintext of 60 characters has as many possible combinations as the advanced encryption standard AES (256-bit) n = number of characters in a plaintext n = 33.000 can be reached over direct competition – encryption standards (AESand RSA) 8 Did you know? Accessing only parts of an encrypted information is not possible with the current encryption standards.
  • 9. 9 Financial Projections for 2020 Sources of funding:  Academic fundings  Generated revenue through trials Projected: 25.000 €  Private investment (Partnership) (depending on investment model) Arrising costs: Acquisition of licenses: Rosetta license for Beta version ~ 5.000€ Additional Staff:  software developers: 24.960 € Marketing & Sales:  cost related to travel expenses, participation to fairs and website: 22.000 € Patents – if deemed necessary:  EU patent 7.320 € / International patent 9.150 € Base for final software product Road to 2020 including Beta software and creation of partnership
  • 10. Timeline and Expert support Feedback and Support from… Prof.M.Vendruscolo (UniversityofCambridge) 10 Prof.Colombo UniversityofPavia ComputationalBiochemestry Prof. F. Forneris UniversityofPavia StrucutralBiology „Èun‘idea tanto rischiosa quanto originale. Por questo avrà successo“ MVP protein base with Rosetta mid Q2 2020 Prof. F. Roli (University of Cagliari) Testing of database and matching end Q2 2020 Partner search and negotiations Q4 2020 Own, indepen- dent database Q4 2021
  • 11. Meet the team 11 Alessia Pisano Lorenzo Rossi Michele Mascherpa Roberto Tinelli Maximilian Kullmann Christian Knoll Phone: +39 389 980 5965 Mail: Biological.Criptography@gmail.com linkedIn: https://linkedin.com/company/bio-graphy