Nokia Key Whitenoise Downloads Summary document Table of Contents Science .......................................................................................................................................................... 3 YouTube Video demos and presentations ................................................................................................ 3 How is a Whitenoise Key created?............................................................................................................ 3 What are the Whitenoise One-Way Functions ......................................................................................... 4 Whitenoise Multiplicity ............................................................................................................................. 5 Calculating length of key stream........................................................................................................... 5 Calculating strength of OTP key ............................................................................................................ 5 How does DIVA work?............................................................................................................................... 6 What is DDKI – Dynamic Distributed Key Infrastructures? ....................................................................... 9 Cyber attacks that are prevented and why? ............................................................................................. 9 Historical problems solved of large scale distributed systems ............................................................... 10 Whitenoise as a Random Number Generator ........................................................................................ 10 Create and speed test a Whitenoise key ................................................................................................ 10 Distributed Keys in turn distributing more distributed keys .................................................................. 10 How do you securely perform key exchange? ........................................................................................ 10 Whitenoise, DIVA and DDKI work seamlessly with PKI ........................................................................... 11 Characteristics of a One Time Pad .......................................................................................................... 11 Characteristics needed by a networked device ...................................................................................... 11 How do you ensure the one time pad is truly random ........................................................................... 11 For streaming purposes in general, how do you authenticate the encryption? .................................... 12 How do you securely perform key exchange? ........................................................................................ 12 1 Nokia Key Whitenoise Downloads Summary document Whitenoise is designed to work with PKI and other security modules .................................................. 12 Whitenoise and DIVA don’t just do encryption ...................................................................................... 13 Scientific achievements .......................................................................................................................... 13 Identity Based Cipher .............................................................................................................................. 13 Validations .................................................................................................................................................. 14 Security Analysis University of California Berkeley................................................................................. 14 Performance Analysis University of Victoria in British Columbia ........................................................... 14 White House Invitation to the First National Cyber Leap Year Summit ................................................. 14 Booz Allen Hamilton Cyber Security Demonstrator................................................................................ 14 Booz Allen Common Criteria Labs ........................................................................................................... 14 $100,000 Whitenoise Challenge ............................................................................................................. 14 $200,000 Challenge That Black Hat Would Not Take ............................................................................. 15 European Telecommunications Standards Institute Presentation ......................................................... 15 United Nations International Telecommunications Union presentation ............................................... 15 Business....................................................................................................................................................... 16 Downloadable presentations, demo software, and market research .................................................... 16 Businesses lines....................................................................................................................................... 16 Protecting the Cloud Business Plan with social media hacking .............................................................. 16 Export License ......................................................................................................................................... 16 Planned ITAR certification....................................................................................................................... 16 Current business initiatives ..................................................................................................................... 16 References .................................................................................................................................................. 18 2 Nokia Key Whitenoise Downloads Summary document Science YouTube Video demos and presentations Go to www.wnlabs.com Click on the Technology Pull down menu > Click on first menu item YouTube videos. How is a Whitenoise Key created? Pic 1: Top part of creating a Whitenoise key stream is creating data source. A variable number of prime number lengths subkey are used and picture them rolling out horizontally infinitely. That data source can be used only until all the seams of the subkeys line up and then it would be repeating itself and losing a one-time-pad quality. 3 Nokia Key Whitenoise Downloads Summary document What are the Whitenoise One-Way Functions Pic 2. Corresponding bits between subkeys are XOr’d (fastest computer function) in a vertical function. RSA one way function as well as smaller foot printed elliptical curves is that mathematically you can’t go backwards and factor or do a mathematical short cut. It is all this math that creates unnecessary overhead and why the keys they still use are so dinky. Our way way function that even lay people can understand are a few fold: o Two bytes of first key stream are run through an S box and only one comes out. It is impossible for a hacker to accurately guess two bytes of information accurately from one byte of information going backwards. o It is impossible for a hacker to know the number and size of subkeys used. o The process is more mechanical than mathematical. But if it was mathematical then the only way they would begin to approach breaking it down would be if the subkey sizes were only in either ascending or descending lengths. Make a key and see that you don’t have to follow a pattern. 4 Nokia Key Whitenoise Downloads Summary document o The subkey lengths are themselves populated with random data from another WN key. o The keys are used dynamically and change so there never is enough time for bad guys. Simply set the rate of change to whatever time frame you want. The key on Black Hat Challenge is changing every 15 seconds. It could be every second etc. o When you don’t use WN keys for encryption, then there is NO cipher text that can be used. Whitenoise Multiplicity Calculating length of key stream Calculating strength of OTP key 5 Nokia Key Whitenoise Downloads Summary document Picture 3 – this shows multiplicity. o The length of a WN key stream is determined by multiplying the lengths of the subkeys used. o The strength of a WN key is determined by adding the lengths of the subkeys and multiplying by 8 bits per byte. The picture shows a key stream of 100 billion bytes and only 158 bytes of key structure need to be stored or transmitted. How does DIVA work? 6 Nokia Key Whitenoise Downloads Summary document 7 Nokia Key Whitenoise Downloads Summary document 8 Nokia Key Whitenoise Downloads Summary document What is DDKI – Dynamic Distributed Key Infrastructures? Cyber attacks that are prevented and why? DIVA operates as a dynamic one-time-pad where a single key can create an infinite number of one-time pads, the only mathematically proven key technology. There is a copy of a key and its last dynamic offset at both the endpoint and the server. The keys are either synchronized or not. The dynamic offsets have to be identical. If not, the system automatically disables the account without human intervention. Man-in-the-Middle attacks are prevented because there is no key exchange Side Channel attacks are prevented because all operations are order 1 after key load and because there is no access to the key Botnet attacks are prevented by configuration with server so the botnet never has access to all the key material. Quantum computing attacks are prevented because every variable is variable and that along with brute force attacks are prevented because the keys can’t be factored. Denial of service attacks, I believe, can be prevented by exploiting unbreakable identity and secure network access so that hackers could never get on a network. 9 Nokia Key Whitenoise Downloads Summary document Historical problems solved of large scale distributed systems Traditionally one had to store the square number of keys of the number of endpoints. For example, a distributed secure system with 10 endpoints would need to store one hundred keys. There is a one to one relationship between endpoints and Whitenoise keys. Using long keys is better than using small keys but storing them and transmitting them became problematic. With Whitenoise multiplicity, one can store or transmit key structure information easily. 158 bytes of key structure information will create a key stream greater than 100 billion bytes long. Whitenoise as a Random Number Generator Microsoft and PGP are said to be moving away from NIST RNG modules because they are not random enough and are causing security problems right out of the gate. WN is a perfect, deterministic random number generator ideal for other traditional crypto, quantum computing and quantum crypto. Create and speed test a Whitenoise key Download key creation utility here: http://www.wnlabs.com/downloads/WNspeedUtilitydemonstrator.zip See how to use it here: https://www.youtube.com/watch?v=9Ebgya6lxS4 Distributed Keys in turn distributing more distributed keys This is a way of securing communications by implementation of Key Vault and Gatekeepers at the data link layer: http://www.wnlabs.com/Tunnel_Distributed_Keys_distributing_more_keys.pdf How do you securely perform key exchange? Level 3 or 4 Identity proofing like handing someone their passport. Put firmware in chips or devices at time of manufacturing. Electronic distribution – you can use Diffie Hellman or SSL if it makes one more comfortable. Bottom line is that after electronic key distribution DIVA/test can assure 10 Nokia Key Whitenoise Downloads Summary document key hasn’t been stolen, captured or spoofed. At this one time distribution, enrollment, authentication, money collection and activation is performed. Please see the link below and the paper below for electronic key distribution. http://www.wnlabs.com/Presentations/Bringing_in_Legacy_Appliances_to_Secure_Networks.pps Whitenoise, DIVA and DDKI work seamlessly with PKI We designed the implementation of WN and DIVA to work seamlessly with PKI. This creates a two channel (asymmetric and symmetric) multi-factor challenge to hackers where one of the keys is dynamic and they have to break two keys in different frameworks for each and every hacking attempt. We encourage that designers continue using ISO-IEC approved modules. We will just protect it. We don’t need to do encryption which usually gets FIPs because you are altering data. Anyone can keep using whatever they have and we will protect the system by preventing the PKI technology from getting broken in the first place without our detection. Designing this way overcame much of the nonsense we have had to deal with. The approved modules satisfy all mandates. WN/DIVA is then just an add-on. At worst we are neutral and everyone is still in all compliance. Characteristics of a One Time Pad The key is random When used for encryption the key is larger than the data encrypted Any key (token) is only used once Characteristics needed by a networked device Connectivity A little bit of storage space for key structure and current dynamic offsets Write back capacity to track current dynamic offsets How do you ensure the one time pad is truly random If the key is random (that is distributed once) then any token used is random. 11 Nokia Key Whitenoise Downloads Summary document Make a key and test it yourself. Encrypt a file. The fastest layman’s test is to just try to compress or zip a key or encrypted file. Compression doesn’t work on random data. Read UVIC performance analysis paper. For streaming purposes in general, how do you authenticate the encryption? It is authenticated encryption (now we are using the key for encryption). Everyone has a unique key. Each stream is uniquely encrypted. No accelerators needed etc. You can also attach headers where tokens are used for various identification purposes. See: http://www.wnlabs.com/Tunnel_Distributed_Keys_distributing_more_keys.pdf How do you securely perform key exchange? Level 3 or 4 Identity proofing like handing someone their passport. Put firmware in chips or devices at time of manufacturing. Electronic distribution – can use Diffie Hellman or SSL if it makes one more comfortable. Bottom line is that after electronic key distribution DIVA/test can assure key hasn’t been stolen, captured or spoofed. Then you do distribution, enrollment, authentication how you choose, money collection and activation: Please see the link below and the paper above. http://www.wnlabs.com/Presentations/Bringing_in_Legacy_Appliances_to_Secure_Networks.pps Whitenoise is designed to work with PKI and other security modules We designed the implementation of WN and DIVA to work seamlessly with PKI. This creates a two channel (asymmetric and symmetric) multi-factor challenge to hackers where one of the keys is dynamic and they have to break two keys in different frameworks for each and every hacking attempt. We encourage that designers continue using ISO-IEC approved modules. We will just protect it. We don’t need to do encryption which usually gets FIPs because you are altering data. Anyone can keep using whatever they have and we will protect the system by preventing the PKI technology from getting broken in the first place without our detection. Designing this way overcame much of the nonsense we have had to deal with. The approved modules satisfy all mandates. WN/DIVA are then just an add on. At worst we are neutral and they are still in all compliance. 12 Nokia Key Whitenoise Downloads Summary document Whitenoise and DIVA don’t just do encryption Whitenoise and DIVA provide: perfect identity secure network access continuous dynamic authentication authorization signature non-repudiation inherent intrusion detection automatic revocation Scientific achievements http://www.wnlabs.com/technology/landmarks.php Identity Based Cipher We are an identity based cipher because everyone has a unique key so by definition they are authenticated with their unique key and unique encryption when that is chosen to be used as well. 13 Nokia Key Whitenoise Downloads Summary document Validations Security Analysis University of California Berkeley http://www.wnlabs.com/pdf/Wagner_Security_Analysis.pdf The security analysis was performed by David Wagner of the University of California Berkeley. He has testified before congress. I particularly like his quote that says if there was a magic computer that could do a trillion trillion calculations per second, and if there was a trillion trillion of these computers spread through the universe, and if we waited a trillion trillion years that the odds of breaking a WN key would be 1 over 2 to the 1300th power which is unimaginably small. Plus a hacker won’t live that long. Performance Analysis University of Victoria in British Columbia http://www.wnlabs.com/downloads/UVIC_Performance_Analysis.pdf Performance analysis was done by ECE Labs at UVIC. They goosed up the NIST test suite to allow only one statistical error on randomness for every thousand rounds instead of allowing for 1 in every hundred rounds. They tested against a super computer array and there was not even 1 acceptable statistical error. We are orders of magnitude more random than radioactive decay, the bench mark for randomness, and this serves key technologies well. White House Invitation to the First National Cyber Leap Year Summit http://www.wnlabs.com/news/leapForward.php We were the only Canadian company invited by White House Office of Science and Technology Policy and NIST; and one of only four foreign companies invited. Booz Allen Hamilton Cyber Security Demonstrator http://www.wnlabs.com/technology/booz.php Booz Allen Common Criteria Labs http://www.wnlabs.com/technology/booz.php $100,000 Whitenoise Challenge 14 Nokia Key Whitenoise Downloads Summary document http://www.wnlabs.com/news/challenge.php $100,000 challenge where we put our money where our mouth is. $200,000 Challenge That Black Hat Would Not Take http://www.wnlabs.com/news/challengeDEFCON.php This is currently on going until August. European Telecommunications Standards Institute Presentation http://www.wnlabs.com/news/standards.php United Nations International Telecommunications Union presentation http://www.wnlabs.com/news/UN_ITU.php 15 Nokia Key Whitenoise Downloads Summary document Business Downloadable presentations, demo software, and market research Including Secure cargo Secure credit cards Secure streaming Market research http://www.wnlabs.com/technology/presentations.php Businesses lines Certificateless authentication Licensing RNG Licensing WN Technologies Products Services Protecting the Cloud Business Plan with social media hacking This is a project/modular based bottom up business plan for securing the cloud. It gives a good development timeline. It was written by a person who was in charge of disruptive technologies for General Dynamics UK. http://www.wnlabs.com/bp.zip Export License This is an EU plus 5 export licence. Export EU plus 5 runs through EXCOL and EXCOL gets permission from CSE Planned ITAR certification ITAR certification in the UK (only $10k) rather than the $250 k that Electronic War Fare Associates want. Current business initiatives Build in Canada Innovation Program (BCIP). 16 Nokia Key Whitenoise Downloads Summary document Public Private Partnerships/R&D Partnerships Group/DHS Science & Technology Directorate eCrypt Technologies – CEO is now Dr. Thomas Cellucci First Director of Commercialization for the US Department of Homeland Security. Global MobileTelecom Satellite and emergency communications project – prototype to be built at UVIC Cambridge Innovation Center MIT o Canadian Cyber Security Accelerator Perion Networks They will pay $1 - $2.50 for every validated install through their developer and reseller base in 60 countries and 240,000 developers who offer “free” software in order to generate advertising revenue. We are going to start off by offering a free email attachment encryptor just as Google is offering a free email encryptor add-on. http://www.wnlabs.com/downloads/Easetup.zip Directions: http://www.wnlabs.com/downloads/Free%20Email%20Attachment%20encryptor%20DI RECTIONS%20FOR%20INSTALL%20AND%20USE.pdf Subsequently we will offer Personal File Security and the Hard Disk Drive Encryptor in the same program. 17 Nokia Key Whitenoise Downloads Summary document References Dr. Abbie Barbir – Handles one of the questions at the UN ITU and is a Chief Systems designer for BoA Thomas Cellucci – First Director of Commercialization for the US Department of Homeland Security and CEO eCrypt Brian O’Higgins – The Founder of Entrust Technologies 18