31
W W HITE HITE N N OISE OISE E E NCODING NCODING People believe that every computer system can be “cracked.” Yahoo, Twitter, and even the large computer security firm, RSA,can attest to this, as they have all been hacked at various times.

W HITE N OISE E NCODING People believe that every computer system can be “cracked.” Yahoo, Twitter, and even the large computer security firm, RSA,can

Embed Size (px)

Citation preview

WWHITE HITE NNOISE OISE EENCODINGNCODINGPeople believe that every computer system can be

“cracked.”Yahoo, Twitter, and

even the large computer security

firm, RSA,can attest to this,as they have all been hacked

at various times.

Those believing computers Those believing computers can never be secure ARE can never be secure ARE

WRONG.WRONG.

They also never thought alight bulb could exist,

but Edison invented one and amazed the world.

He proved they were wrong.

CYBERTHREATS ARE CYBERTHREATS ARE DANGEROUS . . .DANGEROUS . . .

Cyberhacking is now considered

to be the most dangerous threat to most private,

governmental and defense sectors in the modern world.

CYBERTHREATS ARE CYBERTHREATS ARE REAL...REAL...

Major companies have experienced cyber

hackingand lost important

company as well as customer

information.

CYBER-HACKERS THREATEN CYBER-HACKERS THREATEN THE FABRIC OF OUR THE FABRIC OF OUR

SOCIETYSOCIETYGovernments like the U. S. have encountered outside

forces and groups who have attempted to break

into their secure computers containing essential information.

What are potential effects What are potential effects of CYBER-HACKING?of CYBER-HACKING?

Banks could lose control of customers' and their funds. Power companies could be

turned off. Defense missiles could be compromised...

AND MORE.

WHAT DOES WHAT DOES WHITE NOISE WHITE NOISE OFFER TO PROTECT US? OFFER TO PROTECT US?

White Noise offers a solution to the threat of cyber-

hacking that is guaranteed to keep information safe and secure from harm.

WHITE NOISE is YOUR WHITE NOISE is YOUR SECURITY...SECURITY...

White Noise will give peace of mind by ensuring that important computer-stored

information remains private

and untouched.

How Does How Does WHITE NOISE WHITE NOISE Propose To Offer What No Propose To Offer What No

Other Other System Has—Complete System Has—Complete

Security? Security? Consider This: Can you disprove that a2 + b2 = c2 for

any right triangle?

b

a

NO...YOU CANNOT DISPROVE NO...YOU CANNOT DISPROVE IT.IT.

Mathematical proofsare uncrackable.

b

a

THIS IS WHAT WE NEED.THIS IS WHAT WE NEED.

Why not create a computer system that is as

uncrackable as a mathematical proof?

Why Do All Cyber Security Why Do All Cyber Security Systems Fail Sooner or Systems Fail Sooner or

Later?Later?The Reason is: They use

a mathematical algorithm

to randomize the message

they are encoding. IT'S THAT SIMPLE.

What Is the Basic ConceptWhat Is the Basic Conceptof of WHITE NOISEWHITE NOISE ??

There are several stepsto ensure security....but they are totally

uncrackable when takenin proper sequence.

.

Here Are The Basic Steps:Here Are The Basic Steps:1st Step Place completely random

noise in a 64 gb flash drive

using a White Noise Generator (such as radio

static)..

The Basic Steps:The Basic Steps:

2nd Step Give the Transmitter one

copy of the random pattern

and give the Receiver a second copy.

.

The Basic Steps:The Basic Steps:

3rd Step XOR the message with random noise from the Transmitter key.

.

The Basic Steps:The Basic Steps:

Example of Encoding

Message: 11010101 Key: 01011101 Send: 10001000

.

The Basic Steps:The Basic Steps:

4th Step Decode the

transmitted and encrypted message at the

receiving end..

The Basic Steps:The Basic Steps:

Example of Decoding

Received: 10001000 Key: 01011101 Message: 11010101

.

THE END RESULT –THE END RESULT –A TOTALLY SAFE MESSAGE.A TOTALLY SAFE MESSAGE.

There is absolutelyNO WAY TO DECODEthis message without

having the Key.

.

THE VAULT: A VitalTHE VAULT: A VitalPart of the SystemPart of the SystemCentral to the security of

this system is a Vault that is

only connected to the Gate with 3 wires and

can onlysend and receive ASCII

characters..

WHY IS THIS SECURE?WHY IS THIS SECURE?

There are two importantand unique steps which

ensure that cyber-hacking

cannot succeed.

.

TWO PROCESSES ARE TWO PROCESSES ARE VITAL:VITAL:

ASCII and “The Gate”ASCII and “The Gate”At this step, the encryption

is in ASCII, ensuringthat no viruses can

pass...and encryption passesthrough “the Gate.”

THE GATE HOLDS THE THE GATE HOLDS THE “KEY”“KEY”

In sending messages between the Vault and the internet computer, information is safely

passed through a processer called “the

Gate.”.

How Is the Message SentHow Is the Message Sent to the Vault? to the Vault?

The Gate holds the key on a flash drive. It receives encrypted data from the

internet computer asynchronously and

passes it with an interrupt to the Vault .

.

How Is the Message How Is the Message Passed?Passed?The Gate receives data

from the Vault and passes it to the internet

computer in a similar manner. DATA CAN

NEVER LEAVE THE VAULT WITHOUT BEING

ENCRYPTED..

ALL MESSAGING IS ALL MESSAGING IS ENCRYPTEDENCRYPTED

NO DATA CAN PASS FROM THE INTERNET COMPUTER THROUGH THE GATE WITHOUT

PASSING THROUGH THE KEY.

.

How the Vault and Gate How the Vault and Gate WorkWork

The Vault cannot give any commands to the Gate.

The Gate program is only in permanent ROM

and has scratch RAM ONLY.

.

Diagrammatic Diagrammatic RepresentationRepresentation

.

GATEVAULT INTERNET

KEY

IntRW

Ground Ground

W

RInt

<

<< <>>>

PowerPowerPower|| || ||Ʌ Ʌ Ʌ

FURTHER REQUIREMENTSFURTHER REQUIREMENTSThe computers must be

shielded from electromagnetic

radiation.No signal should be

allowed to pass between the power

supplies..

Copyright NoticeCopyright Notice

This is an original idea from the developer,

James T. Parker. [email protected]

May 9, 2013

.