Whitenoise Super Key encryption - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Whitenoise Super Key encryption

Description:

A set of keys created for a specific project ... At the end of the project the keys may be discarded or reassigned to another project ... – PowerPoint PPT presentation

Number of Views:53
Avg rating:3.0/5.0
Slides: 21
Provided by: roycl
Category:

less

Transcript and Presenter's Notes

Title: Whitenoise Super Key encryption


1
Securing the Worlds Information
Whitenoise Computer File Security
2
Whitenoise Computer File Security Portfolio
  • Personal File security
  • Group File security
  • Project File security

3
Whitenoise Personal File Security
  • A fast easy to use encryption device
  • USB based
  • Easily inserts into USB port on
  • Laptop
  • Desktop
  • Can be used in more than one computer
  • Uses new military strength encryption algorithm
    from Whitenoise Labs (US patent pending)

4
Whitenoise Personal File Security
  • Encrypts all types of data
  • Shreds original files after doing stringent data
    accuracy test
  • Can only be decrypted when original key is
    reinserted in USB port on computer
  • You take the key with you
  • The Whitenoise device cant be duplicated
  • Encrypted Corporate or Personal data on lost or
    stolen computer is unreadable
  • Extremely Fast file conversion
  • Friendly intuitive user interface

5
Whitenoise Personal File Security
  • Whitenoise gives the user the ability to select
    the level of shredding applied to the original
    file after an encrypted version has been created

6
Product Comparison
  • Other USB Security Products Available
  • Some use Password Protection (Low Security)To
    protect files saved on the memory device
  • Some use Encryption located on the memory
    device and store the files on that device
  • - If device is lost or stolen both the
    encrypted data and the
    encryption algorithm are stored together
  • Whitenoise File Security gives you the option
  • Store secure encrypted files on your computer
    or on the USB memory stick
  • Whitenoise uses both password protection and
    military strength encryption

7
Product Comparison
  • Whitenoise securely encrypts all designated files
    on your computer
  • Size of encrypted files limited to the size out
    your hard drive not the USB memory stick
  • You take the key with you
  • Secured files can only be read when original key
    is replaced in USB port of computer containing
    encrypted files

8
Product Comparison
  • Whitenoise can replace lost keys
  • Registration process anonymous
  • 3 Unique security questions identify you
  • Original key re-burned
  • Encrypted files on your computer can be restored

9
Securing the Worlds Information
Group File Security
10
Whitenoise Group File Security
  • New Security Option
  • Based on Whitenoise Personal File Security
  • USB Memory based
  • Unique Group Key burned into memory sticks used
    by group members only

11
Whitenoise Group File Security
  • Allows files to be sent and shared between
    members of a predefined group (Exec, Sales, Eng,
    Etc.)
  • Via e-mail, Messenger, File Transfer, etc.
  • Shared files are encrypted by Whitenoise
  • Secures Files sent over Wireless Networks
  • Only members holding one of the Groups Keys can
  • read these protected files
  • Available in various group sizes or custom
    configurations (as many as you need)

12
Securing the Worlds Information
Project File Security
13
Whitenoise Project File Security
  • A set of keys created for a specific project
  • Could involve several trusted companies working
    on a project
  • Could involve members of a company team located
    in multiple locations
  • Securely encrypted documents may now be safely
    sent through any digital media such as wireless
    or the Internet
  • At the end of the project the keys may be
    discarded or reassigned to another project

14
The Whitenoise Encryption Algorithm
  • Extremely fast streaming cipher
  • Adds no appreciable increase in size of file
    being encrypted
  • Large encrypted files can be economically stored
  • Withstood all testing by 2 University test teams
  • UC Berkeley and University of Victoria
  • Over 5 years of Development and Testing
  • US Patent pending

15
Exhaustive key search is not a threat.
Whitenoise uses keys with at least 1600 bits
of randomness. Exhaustive Search of 1600-bit
keys is completely and absolutely infeasible.
Even if we hypothesized the existence of some
magic computer that could test a trillion
trillion key trials per second (very unlikely!),
and even if we could place a trillion trillion
such computers somewhere throughout the universe
(even more unlikely!), and even if we were
willing to wait a trillion trillion years (not a
chance!), then the probability that we would
discover the correct key would be negligible
(about 1/21340, which is unimaginably small).
In this report, I tried every attack I could
think of. All of them failed. This provides
evidence for the hypothesis that Whitenoise is
cryptographically secure.
Professor David Wagner UC
Berkeley, October 2003
( Report available at www.whitenoiselabs.com)
16
  • To verify the nonrepeatability of the key
    generation,(used by Whitenoise) we engineered and
    executed a brute force attack using several Unix
    workstations running in parallel during a week.
    Whitenoise survived all these tests.
  • Whitenoise is a new generation stream cipher
    invented and developed by Whitenoise Labs Inc..
    From our evaluation it appears that Whitenoise
    carries all the characteristics of a one-time pad
    cryptosystem.
  • Traditional one-time pad ciphers are too
    expensive for most applications, since they use
    as much key material as there is traffic. Hence,
    they are used currently mostly for high-level
    diplomatic and intelligence traffic, which
    require undoubtedly, the highest level of
    security possible.
  • The encryption algorithm addresses the
    principle that if the key used to encrypt
    plaintext is random and the length of the key
    exceeds the amount of plaintext to be encrypted,
    the resultant cipher text is unbreakable.

Dr. Issa Traore University of Victoria
Information Security and
Object Technology (ISOT) Group
17
Whitenoise cipher text is unbreakable. The key
exchange protocol provides an alternative to the
prevalent Public Key Infrastructure that is
expensive and cumbersome to implement.
From these results, it appears that the
Whitenoise encryption process is very fast
compared to available cryptosystems , and that
it can be used equally to encrypt various kinds
of data formats, and hence can be used for
various kinds of applications Whitenoise is
an efficient and cost-effective algorithm for
securing direct communications from
point-to-point over different media. It is also
ideal to be utilized to create a secure network
layer for the Internet. Dr. Issa Traore
University of Victoria
18
Internet and Computer Security, Wireless Networks
and Cryptography
Wagner cut his reputation in cybersecurity at the
young age of 21 when, in 1995, he cracked
Netscapes software security code that was
designed to encrypt credit card numbers. He has
since has drawn attention to other security
flaws, warning of privacy and fraud risks in
encrypted cell phone conversations and of
security vulnerabilities in wireless computer
networks. Most recently, he co-authored a report
disclosing serious flaws in a federally funded
Internet voting system. The project, due to be
used in the 2004 primary and general elections,
was eventually scrapped by the Pentagon, largely
because of the security flaws highlighted by
Wagner and his co-authors.
Asst Prof David Wagner,
In 2003, he was awarded a Sloan Research
Fellowship to "recognize and support young
scientists and scholars" in various fields. He
was also named one of Popular Science's
"Brilliant 10" researchers for his work in
cryptography the same year. Wagner remains
active in the areas of computer security,
Internet security, privacy, cryptography, and
e-voting security.
  • The Information Security and Object Technology
    (ISOT) Research Lab
  • was founded in 1999, and since then has been
    carrying out innovative research in computer
    security and software engineering.
  • The main research thread pursued in the ISOT lab
    lies in rigorous development of secure and
    dependable computing systems and in the
    protection of these systems. Their recent and
    current research activities include the
    following
  • Software verification technologies
  • Validation and verification of Cryptographic
    systems
  • Software security
  • Distributed systems security

Dr. Issa Traore
19
Ordering Information
  • For information on how to
  • Purchase Whitenoise File Security products
  • or
  • Try Whitenoise free for 30 days
  • Please refer to our web site

20
Securing the Worlds Information
Whitenoise Computer File Security
Write a Comment
User Comments (0)
About PowerShow.com