10
ROSS HARRIS – DIRECTOR OF SALES RICHARD BLECH - CEO BADAR QURESHI - CIO © 2 0 1 5 S e c u r e C h a n n e l s , I n c . www.securechannels.com HUMBLE THE HACKER!

Secure Channels Overview - Humble The Hacker

Embed Size (px)

Citation preview

Page 1: Secure Channels Overview - Humble The Hacker

© 2015 S

ecure Channels, Inc.

ROSS HARRIS – DIRECTOR OF SALES

RICHARD BLECH - CEO

BADAR QURESHI - CIO

www.securechannels.com

HUMBLETHE

HACKER!

Page 2: Secure Channels Overview - Humble The Hacker

Free BMW Anyone?

Page 3: Secure Channels Overview - Humble The Hacker

Challenge Top Black Hat hackers to break Secure

Channels Encrypted file – Black Hat 2014 Conference

Result 155 Black Hat Hackers Fail to Crack Secure

Channels' Patented Encryption Technology - Yahoo Finance

Black Hat 2014 Hack-a-thon

Can’t Touch This!

Page 4: Secure Channels Overview - Humble The Hacker

Secure Channels DNA Cyber-Security Company

Delivering – Paradigm shifting Security Solutions for the Enterprise

With – Blazing Fast, Innovative “Plug & Play” Software, Hardware, and Cloud encryption systems

Using – Highly Disruptive and Patented UNBREAKABLE ENCRYPTION Processes

Page 5: Secure Channels Overview - Humble The Hacker

Unbreakable Encryption

For the technical thinkers…here is the MATH Given the math below and using an extremely strong (the strongest is open-ended) pattern then we can use the following values to answer this

question.

I. Current super computer: 19 petaflops or 19 x 1015 operations per second

II. 10 keys of 64KB: thus 10 keys of 524,288 bits to a total of 5,242,880 bits

III. A pattern key of 16 passes thus raising the possible combinations to 5,242,88016 (yes, the number begin to get ridiculous).

1) The above gives us a number of combinations of 3.259e 107.

2) So, we now have the following:

3) The number of possible combinations

4) 3.259257562135177738029513101455e+107

5) The number of operations per second of the fastest supercomputer

6) 19,000,000,000,000,000 per second

7) Given the above we divide the number of combinations by the number of operations per second and we get the total number of seconds it would take to break the above designed key set.

8) 3.259257562135177738029513101455e+107 / 19,000,000,000,000,000 = 1.7153987169132514410681647902395e+91.

9) That number of seconds is incomprehensible so let’s break it down.

10) There are 31,536,000,000 seconds in a millennia. So it would take 5.4394936482535877760913393906631e+80 millennia to break the key set. Let’s take this further.

11) The estimated age of the universe is 19 billion years, or 19,000,000,000. So it will take 2.8628913938176777768901786266648e+70 times the age of the universe to break the key set.

12) A very long answer but the math is useful to see when I say that the encryption can’t be broken. Yes, sometime short of eternity it theoretically could be broken but for all intents and purposes, that’s long enough.

Page 6: Secure Channels Overview - Humble The Hacker

Anthem

80,000,000 Records Stolen - Name, DOB, SSN#, Addr, Phone, Email, Employment info,

JP Morgan Chase

76,000,000 Records Stolen – Name, Addr, Phone, Email of account holders

Sony

100 Terabytes of Data – Personal Employee Info, Unreleased Sony Films

WHY

There’s much to gain

Massive Market for Stolen Data

Competitive Advantage

Political Agendas

The Epidemic

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Page 7: Secure Channels Overview - Humble The Hacker

The Solution Work on the

People - Security is a Priority, not a reactionary after-the-fact after-thought

Process – Institute Security Controls in Business alignment

Technology – Merge Business needs with Technical solutions - Mobile, Cloud, Datacenter, and Impression based Complex Key GenerationDevaluing Data to the Hacker –

Make the data uselessUsing Secure Channels PATENTED

Superencipherment

Page 8: Secure Channels Overview - Humble The Hacker

How - Superencipherment IEaaS™ - Intelligent Encryption As A Service

PKMS2™ - Pattern Key Multi-Segment, Multi-Strength (or Standard)

Thin and Easy to Integrate High-Security Solutions

Starts where AES256 Ends – Deepens and Hardens

Data is encapsulated using PATENTED PKMS2™

Completely FIPS Compliant, using YOUR Existing Libraries

User-defined while being Data and Key agnostic

Page 9: Secure Channels Overview - Humble The Hacker

Delivery Local Datacenter Cloud Systems Cross-platform Databases Mobile Systems Resource Based Authentication DRM, HSM

Page 10: Secure Channels Overview - Humble The Hacker

Humble YOUR hacker… Schedule your discovery meeting

and Live Demo today!

Ross Harris – 949.679.5702 – [email protected]

http://www.securechannels.com