22
Unmatched Security for the Digital Ecosystem

Secure Channels Presentation

Embed Size (px)

Citation preview

Page 1: Secure Channels Presentation

Unmatched Security for the Digital Ecosystem

Page 2: Secure Channels Presentation

Data Breaches is the Increasing Threat

Identity Theft Resource Center2014 Breach List: Breaches: 480 Exposed: 17,508,452Report Date: 8/19/2014Source: http://www.idtheftcenter.org/

Page 3: Secure Channels Presentation

Data ENCRYPTION is the answer

Secure Channels Patented Encryption will just do that.

Secure Channels patented encryption works even if a private cloud is hacked, because the only thing a hacker can see is useless bits and bytes without the set of encryption keys, pattern keys, scripts, and source code required to make any sense of it.

Page 4: Secure Channels Presentation

Secure Channels IncTECHNOLOGY

PKMS2

Pattern Key Multi Segment, MultiStandard

SPHERE

SecureChannels Process Hardened Encryption Resource Envelopment

Page 5: Secure Channels Presentation

Secure Channels IncTECHNOLOGY

PKMS2

Pattern Key Multi Segment, MultiStandard

Page 6: Secure Channels Presentation

PKMS2 Introduction

• PKMS2 is a radically new take on standard FIPS certified encryption practices.

• PKMS2 stands for Pattern Key Multi-Segment, Multi Strength (or Standard)

• One of the inherent difficulties with encryption is the use of a single key or protocol to encrypt data. PKMS2 solves that problem.

Secure Channels Inc Patent TechnologyPKMS2

Page 7: Secure Channels Presentation

PKMS2 Solution• PKMS2 breaks a document into segments and encrypts each segment

individually.• The protocol/password used per segment is based on a pattern key and can

be as simple or as complex as necessary. This pattern is user-derived and thus can be as unique as the user wants.

• Given ‘n’ number of keys/passwords/etc. and a pattern of usage of said keys then the document in encrypted in a round robin fashion rolling through the pattern.

• The document can be [optionally] initially encrypted as a whole resource and then segmented and then the resultant encrypted segments can also be encrypted as a while resource.

Secure Channels Inc Patent TechnologyPKMS2

Page 8: Secure Channels Presentation

FIPS Certification

• Since PKMS2 only uses FIPS certified third party encryption libraries then the resultant encrypted document, by definition, is also FIPS certified.

• The segment size is based on the key bit strength formula (s/8 – 11) bytes. The segments encrypted with passwords have the length embedded in the resource.

Secure Channels Inc Patent TechnologyPKMS2

Page 9: Secure Channels Presentation

Secure Channels Inc Patent TechnologyPKMS2

Baked Shrimp

Melt a stick of butter in the pan. Slice one lemon and layer

it on top of the butter. Put down fresh shrimp, then

sprinkle one pack of dried Italian seasoning. Put in the oven and bake at 350 for 15

min. Best Shrimp you will EVER taste:)

Ordinary Document

Apply initial encryption pattern with key 5 (yellow)

Initial optional encryption

Change angle to see layersSegment 1 with Process 1

Encrypt segment #1 with key 2 (red)

Encrypt segment #3 with key 8 (blue)

Segment 3 with Process 3

Encrypt segment #4 with key 7 (purple)

Segment 4 with Process 4

Encrypt segment #5 with key 2 (red)

Segment 5 with Process 1

Encrypt segment #6 with key 6 (green)

Segment 6 with Process 2

Encrypt segment #7 with key 8 (blue)

Segment 7 with Process 3

Encrypt segment #2 with key 6 (green)

Segment 2 with Process 2

Apply optional final encryption with key 4

PKMS2 applied – for all practical purposes, the document is immune to hacker decryption

Final Optional Encryption

Encrypt segment #8 with key 7 (purple)

Segment 8 with Process 4

Page 10: Secure Channels Presentation

Secure Channels IncTECHNOLOGY

SPHERE

SecureChannels Process Hardened Encryption Resource Envelopment

Page 11: Secure Channels Presentation

SPHERE Defined

• SPHERE stands for SecureChannels Process Hardened Encryption and Resource Enveloping. That might seem to be quite the verbiage but it is very specific and descriptive. Let’s tear it apart and examine each piece.

Secure Channels Inc TechnologySphere

Page 12: Secure Channels Presentation

Process Hardened

One of the driving forces was the PKMS21 (Pattern Key, Multi Strength, Multi Segment) process being patented. Once this patent was done then all of a sudden SecureChannels had in its grasp the means it was waiting for: the ability and means to secure data via encryption that would render the data, for all intents and purposes, unbreakable.

Secure Channels Inc TechnologySphere

Page 13: Secure Channels Presentation

Process Hardened cont.

So here was a means to secure data in a data center but the world was changing and becoming far more mobile. PKMS2’s depth of security requires computing power that usually is not available on a mobile platform. What was needed was a similar technique that would work on mobile platforms. Fortunately, one of the early enterprise contract required mobile platform usage so another process was already in development. This new technique was born in the mobile world and thus was able to provide a similarly high level of security on mobile platforms.

Secure Channels Inc TechnologySphere

Page 14: Secure Channels Presentation

Process Hardened cont.

So here was a means to secure data in a data center but the world was changing and becoming far more mobile. PKMS2’s depth of security requires computing power that usually is not available on a mobile platform. What was needed was a similar technique that would work on mobile platforms. Fortunately, one of the early enterprise contract required mobile platform usage so another process was already in development. This new technique was born in the mobile world and thus was able to provide a similarly high level of security on mobile platforms.

Secure Channels Inc TechnologySphere

Page 15: Secure Channels Presentation

Resource Enveloping

• What is needed to resolve a number of security issues is not to physically surround the data center but to digitally surround the data. SPHERE’s design is one of wrapping the data in such a way as to make the data utterly useless without full knowledge of a number of factors. In the past digital data security has relied solely on the encryption patterns and key. If the pattern is known and the key is known then the security of the data is zero. Where SPHERE is different is that it wraps layered processes around the data in such a way that it takes

Secure Channels Inc TechnologySphere

Page 16: Secure Channels Presentation

Resource Enveloping cont.

• - knowledge of the manner in which the layers were applied;

• - knowledge of the standard and proprietary encryption patterns;

• - knowledge of all of the keys used;

• - knowledge of the pattern by which the keys were applied;

• - knowledge of the customer defined ‘uniqueness’ of the processing

• The data resource is wrapped or enveloped in such a way that it creates an incalculable combination of possibilities to decrypt and thus renders the data virtually unbreakable.

Secure Channels Inc TechnologySphere

Page 17: Secure Channels Presentation

Resource Enveloping cont.

Due to the flexibility of SPHERE an entire scripting language was developed to drive the encryption process. These scripts can be completely unique per customer. Each encryption function is fully standalone and thus each script can be uniquely created in almost an unlimited pattern. One customer might encrypt their data with a script that specifies functions A,B,C whereas another customer might specify the same functions but in B,A,C order. This flexibility adds immeasurable depth to the security of the data. One customer might use pictures for passwords whilst another might use Japanese phrases. Since SPHERE has no limit to the number of functions; number of keys/passwords; no limit to the size of said keys/passwords then the ability to encrypt data to an unbreakable level is strictly under customer control.

Secure Channels Inc TechnologySphere

Page 18: Secure Channels Presentation

SPHERE Deployed

• With the depth of PKMS2, the speed of SHIELD, SecureChannels finds that it can deploy its security systems into enterprise data centers; PC workstations; or mobile devices. The sky truly is the limit since SPHERE is about enabling the customer to secure and encrypt THEIR data THEIR way and under THEIR control.

Conclusion

• The question was asked earlier “Is the data worth protecting and if so then how can it be done?” SecureChannels has developed SPHERE such that the answer to the question is a resounding yes. As has been seen in the news we can assume data will be stolen but by applying SPHERE to the data the data itself becomes meaningless outside of a SPHERE enabled system.

Secure Channels Inc TechnologySphere

Page 19: Secure Channels Presentation

SPHERE Deployed

• With the depth of PKMS2, the speed of SHIELD, SecureChannels finds that it can deploy its security systems into enterprise data centers; PC workstations; or mobile devices. The sky truly is the limit since SPHERE is about enabling the customer to secure and encrypt THEIR data THEIR way and under THEIR control.

Secure Channels Inc TechnologySphere

Page 20: Secure Channels Presentation

Conclusion

• The question was asked earlier “Is the data worth protecting and if so then how can it be done?” Secure Channels has developed patented encryption PKMS2 and the answer to the question is a resounding yes. As has been seen in the news we can assume data will be stolen but by applying our patent encryption to the data the data itself becomes meaningless outside of the enabled system.

Secure Channels Inc Technology

Page 21: Secure Channels Presentation

Secure Channels Inc. Debuts New Patented Encrypted Technology at BlackHat 2014

http://finance.yahoo.com/news/secure-channels-inc-debuts-patented-100100805.html

Black Hat Hackers Fail to Crack Encryption Tech

http://www.dfinews.com/news/2014/08/black-hat-hackers-fail-crack-encryption-tech

Secure Channels Inc TechnologyPress release

Page 22: Secure Channels Presentation

Unmatched Security for the Digital Ecosystem