The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm. It is also known as cascade encryption, cascade ciphering, and multiple encryption. Superencipherment refers to the outer-level encryption of a multiple encryption. The process and modernized techniques for doing so has been patented due to its technological advancement.
This patented protocol is known as PKMS2 [Patern-Key-Multi-Segment-Multi-Standard], also known as: SYSTEM AND METHOD FOR SECURING MULTIPLE DATA SEGMENTS HAVING DIFFERENT LENGTHS USING PATTERN KEYS HAVING MULTIPLE DIFFERENT STRENGTHS.
The PKMS2 protocol significantly, and provably, improves the security guarantees offered by modern block ciphers. When measured in terms of bit strength (i.e., keyspace) PKMS2 provides an increase of over 50%. For example, compared to AES-256, which provides 256 bits of security, PKMS2 provides 386 bits of security. Additionally, PKMS2 increases an attacker’s workload (as measured in time) with respect to recovering a plaintext by at least two orders of magnitude. That is, if a workload without PKMS2 is time 2384, the workload with PKMS2 would be between 128 * 2384 and 256 * 2384. It’s important to note that increases in effective key length offered by PKMS2 are reflective of the key lengths of the constituent ciphers. Therefore, if a series of 512-bit ciphers were used, it is reasonable to expect that PKMS2 would extend the effective bit strength to approximately 770 bits. As a result, PKMS2 provides a security hedge against future exhaustive key search (brute force) attacks made possible by advances in quantum computing. In effect, PKMS2 provides a continually expanding buffer against improvements in cryptanalytic computing technology that will maintain data security for the foreseeable future.
When AES (Advanced Encryption Standard) was first published in 2001, the volumes of data held in a digital form were vastly smaller than the volumes of today. AES 256 is the highest, strongest standard encryption algorithm. However, it is a very heavy algorithm with a large key and block size for the total amount of the data volume that is now encrypted. It is also frequently not deployed efficiently. The result is causing significant degradation to the speed and movement with which data flows through an enterprise’s infrastructure. As CPU power continues to regularly increase along with the sophistication of hackers’ capabilities, the effectiveness of the single remaining highest standard, AES256, will continue to decrease.
1) No Encryption – Numerous hacks like OPM, JP Morgan Chase, SONY did not encrypt their sensitive data which was ultimately stolen.
2) Ineffective Encryption – High quality encryption may be deployed in ways that are not effective. Data may be encrypted on-the-wire, but not on disk, or vice versa. The keys used for encryption may not be protected, or managed in a way that allows too-ready availability.
3) Weak Encryption or poor encryption management – Many existing solutions are complex, resource heavy, and open to specialized attacks on AES Keys.
4) Reliance on Legacy Solutions – Hackers successfully attack AES, 3DES and the single-source key management systems that support them. Once broken, legacy systems remain broken, and the knowledge of how to break them spreads. SSL has been replaced with TLS because it is broken. The current version of TLS will be 1.3 very soon because the earlier versions all have weaknesses which hackers are learning how to exploit. Independent of those protocol weaknesses, there is little or no support for deploying TLS in a way which can resist State sponsored attacks and hackers will gain the ability to use similar techniques. LEGACY SYSTEMS DO NOT WORK against today’s sophisticated hacker’s capabilities.
Effective - Existing/Legacy solutions have been compromised and open to multiple attack vectors. Secure Channels targets the top attack vectors and hardens exposed environments.
Secure - When data is encrypted at the core with Secure Channel’s encryption process, the hacker is left with useless bits and bytes, not sensitive information.
Fast – PKMS2 increases the speed of encryption substantially. (10x to 12x for a majority of files) The overhead of our encryption process is not noticeable.
Easy – The SCI encryption engine is easy to deploy, light, and “plug & play”. It integrates seamlessly within the Enterprise infrastructure.
Cost Efficient – Secure Channels is the most cost effective option vs. competitors.
Future Proof – Our Patented encryption process can be slipstreamed, work as an agent, middleware, or plugin. It is agnostic to all data types and user-defined, allowing the user to decide the levels of hardening above AES256 that is desired.
If you spend the effort & money, shouldn’t your encryption solution work? – SafeNet, FireEye, Thales, Symantec, CISCO and several major providers have been compromised. Off-the-shelf solutions are vulnerable. Designed Intelligent Encryption as a Service, or user-defined customized encryption, is the surest way to protect sensitive data at its core within the security stack.