Title: Whitenoise Super Key encryption
1Securing the Worlds Information
Whitenoise Computer File Security
2Whitenoise Computer File Security Portfolio
- Personal File security
- Group File security
- Project File security
3Whitenoise Personal File Security
- A fast easy to use encryption device
- USB based
- Easily inserts into USB port on
- Laptop
- Desktop
- Can be used in more than one computer
- Uses new military strength encryption algorithm
from Whitenoise Labs (US patent pending)
4Whitenoise Personal File Security
- Encrypts all types of data
- Shreds original files after doing stringent data
accuracy test - Can only be decrypted when original key is
reinserted in USB port on computer - You take the key with you
- The Whitenoise device cant be duplicated
- Encrypted Corporate or Personal data on lost or
stolen computer is unreadable - Extremely Fast file conversion
- Friendly intuitive user interface
5Whitenoise Personal File Security
- Whitenoise gives the user the ability to select
the level of shredding applied to the original
file after an encrypted version has been created
6Product Comparison
- Other USB Security Products Available
- Some use Password Protection (Low Security)To
protect files saved on the memory device - Some use Encryption located on the memory
device and store the files on that device - - If device is lost or stolen both the
encrypted data and the
encryption algorithm are stored together - Whitenoise File Security gives you the option
- Store secure encrypted files on your computer
or on the USB memory stick - Whitenoise uses both password protection and
military strength encryption
7Product Comparison
- Whitenoise securely encrypts all designated files
on your computer - Size of encrypted files limited to the size out
your hard drive not the USB memory stick - You take the key with you
- Secured files can only be read when original key
is replaced in USB port of computer containing
encrypted files
8Product Comparison
- Whitenoise can replace lost keys
- Registration process anonymous
- 3 Unique security questions identify you
- Original key re-burned
- Encrypted files on your computer can be restored
9Securing the Worlds Information
Group File Security
10Whitenoise Group File Security
- New Security Option
- Based on Whitenoise Personal File Security
- USB Memory based
- Unique Group Key burned into memory sticks used
by group members only
11Whitenoise Group File Security
- Allows files to be sent and shared between
members of a predefined group (Exec, Sales, Eng,
Etc.) - Via e-mail, Messenger, File Transfer, etc.
- Shared files are encrypted by Whitenoise
- Secures Files sent over Wireless Networks
- Only members holding one of the Groups Keys can
- read these protected files
- Available in various group sizes or custom
configurations (as many as you need)
12Securing the Worlds Information
Project File Security
13Whitenoise Project File Security
- A set of keys created for a specific project
- Could involve several trusted companies working
on a project - Could involve members of a company team located
in multiple locations - Securely encrypted documents may now be safely
sent through any digital media such as wireless
or the Internet - At the end of the project the keys may be
discarded or reassigned to another project
14The Whitenoise Encryption Algorithm
- Extremely fast streaming cipher
- Adds no appreciable increase in size of file
being encrypted - Large encrypted files can be economically stored
- Withstood all testing by 2 University test teams
- UC Berkeley and University of Victoria
- Over 5 years of Development and Testing
- US Patent pending
15Exhaustive key search is not a threat.
Whitenoise uses keys with at least 1600 bits
of randomness. Exhaustive Search of 1600-bit
keys is completely and absolutely infeasible.
Even if we hypothesized the existence of some
magic computer that could test a trillion
trillion key trials per second (very unlikely!),
and even if we could place a trillion trillion
such computers somewhere throughout the universe
(even more unlikely!), and even if we were
willing to wait a trillion trillion years (not a
chance!), then the probability that we would
discover the correct key would be negligible
(about 1/21340, which is unimaginably small).
In this report, I tried every attack I could
think of. All of them failed. This provides
evidence for the hypothesis that Whitenoise is
cryptographically secure.
Professor David Wagner UC
Berkeley, October 2003
( Report available at www.whitenoiselabs.com)
16- To verify the nonrepeatability of the key
generation,(used by Whitenoise) we engineered and
executed a brute force attack using several Unix
workstations running in parallel during a week.
Whitenoise survived all these tests. - Whitenoise is a new generation stream cipher
invented and developed by Whitenoise Labs Inc..
From our evaluation it appears that Whitenoise
carries all the characteristics of a one-time pad
cryptosystem. - Traditional one-time pad ciphers are too
expensive for most applications, since they use
as much key material as there is traffic. Hence,
they are used currently mostly for high-level
diplomatic and intelligence traffic, which
require undoubtedly, the highest level of
security possible. - The encryption algorithm addresses the
principle that if the key used to encrypt
plaintext is random and the length of the key
exceeds the amount of plaintext to be encrypted,
the resultant cipher text is unbreakable.
Dr. Issa Traore University of Victoria
Information Security and
Object Technology (ISOT) Group
17 Whitenoise cipher text is unbreakable. The key
exchange protocol provides an alternative to the
prevalent Public Key Infrastructure that is
expensive and cumbersome to implement.
From these results, it appears that the
Whitenoise encryption process is very fast
compared to available cryptosystems , and that
it can be used equally to encrypt various kinds
of data formats, and hence can be used for
various kinds of applications Whitenoise is
an efficient and cost-effective algorithm for
securing direct communications from
point-to-point over different media. It is also
ideal to be utilized to create a secure network
layer for the Internet. Dr. Issa Traore
University of Victoria
18Internet and Computer Security, Wireless Networks
and Cryptography
Wagner cut his reputation in cybersecurity at the
young age of 21 when, in 1995, he cracked
Netscapes software security code that was
designed to encrypt credit card numbers. He has
since has drawn attention to other security
flaws, warning of privacy and fraud risks in
encrypted cell phone conversations and of
security vulnerabilities in wireless computer
networks. Most recently, he co-authored a report
disclosing serious flaws in a federally funded
Internet voting system. The project, due to be
used in the 2004 primary and general elections,
was eventually scrapped by the Pentagon, largely
because of the security flaws highlighted by
Wagner and his co-authors.
Asst Prof David Wagner,
In 2003, he was awarded a Sloan Research
Fellowship to "recognize and support young
scientists and scholars" in various fields. He
was also named one of Popular Science's
"Brilliant 10" researchers for his work in
cryptography the same year. Wagner remains
active in the areas of computer security,
Internet security, privacy, cryptography, and
e-voting security.
- The Information Security and Object Technology
(ISOT) Research Lab - was founded in 1999, and since then has been
carrying out innovative research in computer
security and software engineering. - The main research thread pursued in the ISOT lab
lies in rigorous development of secure and
dependable computing systems and in the
protection of these systems. Their recent and
current research activities include the
following - Software verification technologies
- Validation and verification of Cryptographic
systems - Software security
- Distributed systems security
Dr. Issa Traore
19Ordering Information
- For information on how to
- Purchase Whitenoise File Security products
- or
- Try Whitenoise free for 30 days
- Please refer to our web site
20Securing the Worlds Information
Whitenoise Computer File Security