Page 43 - index
P. 43
155 Black hat hackers fail to crack Secure Channels’ patented
encryption technology
155 Hackers took the “Can You Break This” Challenge; None Could Break Secure Channels’ New PKMS2
Patented Encryption Technology
By Richard Blech
Each year, Black Hat introduces the latest security technologies and brings with it of some of
the best hackers in the world. With the masses of hackers in attendance, Secure Channels’
wanted to do something a little different and introduce a “Can You Break This” challenge to any
hacker that thought they could break our newly patented PKMS2 (Pattern Key Multi Segment,
Multi Standard) Encryption Technology. Who doesn’t like a little competition and the potential to
win a new BMW? With any competition there can only be one winner and the results of this
challenge produced a shutout. One hundred and fifty-five hackers participated, yet none were
successful.
More than 75 percent of the 155 hackers did attempt to crack a secret encrypted file that held a
virtual key to a 2014 BMW. As an innovator in the development of patented encryption
technologies that protect data in motion and data at rest, we were confident that it was
unbreakable. As the clock clicked down to the end of the conference at 5 pm on August 7,
there were a lot of tired fingers and frustrated minds, but no one had cracked the code.
Data breaches do not just reside at the perimeter as the most serious breaches come
unsuspectingly from within. Encryption protects your data with certainty by enveloping it with
impenetrable encryption which leaves the thief (either internal or external) with only useless bits
and bytes.
AES 256 has an NSA backdoor which means that an exploit already exists. What we need now
is an encryption standard that truly has no backdoors. If the NSA has probable cause then they
can obtain a warrant to get the data, but in other situations data should be protected to the point
of impenetrability.
The Secure Channels’ PKMS2 technology uses available FIPS-certified third party encryption
libraries to produce “unbreakable” communications and data files through:
The usage of third party libraries enabling the process to be extensible to any future
development in encryption patterns. Secure transmission and storage of data in a network or via
mobile devices.
Breaking a file into segments and encrypts each segment individually while encrypting data and
increasing the time to encrypt and decrypt a file by only 20 percent from AES 256 standard.
PKMS2's strength rises exponentially with the number of keys used and patterns chosen.
43 Cyber Warnings E-Magazine – August 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide