Black Hat Hackers Fail to Crack Encryption Tech – Forensic Magazine
[et_pb_section bb_built=”1″ admin_label=”section” _builder_version=”3.0.47″][et_pb_row admin_label=”row” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.2.2″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]
Secure Channels Inc., an innovator in the development of patented encryption technologies that protect data in motion and data at rest, has announced that none of the 155 hackers at the recent Black Hat USA 2014 Conference in Las Vegas who participated in a “Can You Break This” contest were able to hack the company’s new patented PKMS2® Encryption Technology.
The company estimates that 75 percent of the 155 hackers who had to sign a 26-page agreement of the contest’s rules did attempt to crack a secret encrypted file that held a virtual key to a 2014 BMW 320i Series Sedan courtesy of Irvine BMW. But when the conference closed at 5 PM on August 7, no one had cracked the code.
“It would take a supercomputer making 19 quadrillion calculations per second at nearly 30 times the age of the universe to break the encryption of Secure Channels PKMS2®,” said Richard Blech, CEO, Secure Channels. “Data breaches do not just reside at the perimeter. The most serious breaches come unsuspectingly from within. Protect your data with certainty by enveloping it with impenetrable encryption which leaves the thief with only useless bits and bytes.” The Secure Channels’ PKMS2® (Pattern Key Multi Segment, Multi Standard) technology uses available FIPS-certified third party encryption libraries to produce “unbreakable” communications and data files through:
The usage of third party libraries enabling the process to be extensible to any future development in encryption patterns. Secure transmission and storage of data in a network or via mobile devices.
Breaking a file into segments and encrypts each segment individually while encrypting data and increasing the time to encrypt and decrypt a file byonly 20 percent from AES 256 standard. PKMS2®′s strength rises exponentially with the number of keys used and patterns chosen.
The protocol/password used per segment is based on a pattern key and can be as simple or complex as necessary for authentication. An entire data file of any type (a photo, a song, a video, or a document) can be a password depending on what the user wants.
Secure Channels’ SPHERE technology combines the following into a cohesive process for mobile devices: Current encryption standards (e.g. AES256) together with the company’s own patented protocols based on PKMS2®. Secure Channels’ mathematical encryption models with more than 350 patterns and an encryption oriented scripting language together with optional customer encryption processes. An unbreakable standard that is unparalleled in the industry. By crafting scripts that start where most cybersecurity tools finish, such as FIPS compliance, Secure Channels can provide the flexibility of minimal security for FIPS compliance to the company’s maximal security of a virtually impenetrable nature. Customers can inject their own encryption standards into the Secure Channels process pipeline thus assuring that their data is theirs alone. Enable encryption from endpoint to endpoint, covering data storage through transmission, while making the Cloud safer than a military data center.
The original article can be seen here