How do you securely perform key exchange?

advertisement
Nokia Key Whitenoise Downloads Summary document
Table of Contents
Science .......................................................................................................................................................... 3
YouTube Video demos and presentations ................................................................................................ 3
How is a Whitenoise Key created?............................................................................................................ 3
What are the Whitenoise One-Way Functions ......................................................................................... 4
Whitenoise Multiplicity ............................................................................................................................. 5
Calculating length of key stream........................................................................................................... 5
Calculating strength of OTP key ............................................................................................................ 5
How does DIVA work?............................................................................................................................... 6
What is DDKI – Dynamic Distributed Key Infrastructures? ....................................................................... 9
Cyber attacks that are prevented and why? ............................................................................................. 9
Historical problems solved of large scale distributed systems ............................................................... 10
Whitenoise as a Random Number Generator ........................................................................................ 10
Create and speed test a Whitenoise key ................................................................................................ 10
Distributed Keys in turn distributing more distributed keys .................................................................. 10
How do you securely perform key exchange? ........................................................................................ 10
Whitenoise, DIVA and DDKI work seamlessly with PKI ........................................................................... 11
Characteristics of a One Time Pad .......................................................................................................... 11
Characteristics needed by a networked device ...................................................................................... 11
How do you ensure the one time pad is truly random ........................................................................... 11
For streaming purposes in general, how do you authenticate the encryption? .................................... 12
How do you securely perform key exchange? ........................................................................................ 12
1
Nokia Key Whitenoise Downloads Summary document
Whitenoise is designed to work with PKI and other security modules .................................................. 12
Whitenoise and DIVA don’t just do encryption ...................................................................................... 13
Scientific achievements .......................................................................................................................... 13
Identity Based Cipher .............................................................................................................................. 13
Validations .................................................................................................................................................. 14
Security Analysis University of California Berkeley................................................................................. 14
Performance Analysis University of Victoria in British Columbia ........................................................... 14
White House Invitation to the First National Cyber Leap Year Summit ................................................. 14
Booz Allen Hamilton Cyber Security Demonstrator................................................................................ 14
Booz Allen Common Criteria Labs ........................................................................................................... 14
$100,000 Whitenoise Challenge ............................................................................................................. 14
$200,000 Challenge That Black Hat Would Not Take ............................................................................. 15
European Telecommunications Standards Institute Presentation ......................................................... 15
United Nations International Telecommunications Union presentation ............................................... 15
Business....................................................................................................................................................... 16
Downloadable presentations, demo software, and market research .................................................... 16
Businesses lines....................................................................................................................................... 16
Protecting the Cloud Business Plan with social media hacking .............................................................. 16
Export License ......................................................................................................................................... 16
Planned ITAR certification....................................................................................................................... 16
Current business initiatives ..................................................................................................................... 16
References .................................................................................................................................................. 18
2
Nokia Key Whitenoise Downloads Summary document
Science
YouTube Video demos and presentations
Go to www.wnlabs.com Click on the Technology Pull down menu > Click on first menu item YouTube
videos.
How is a Whitenoise Key created?

Pic 1: Top part of creating a Whitenoise key stream is creating data source. A variable
number of prime number lengths subkey are used and picture them rolling out
horizontally infinitely. That data source can be used only until all the seams of the
subkeys line up and then it would be repeating itself and losing a one-time-pad quality.
3
Nokia Key Whitenoise Downloads Summary document
What are the Whitenoise One-Way Functions

Pic 2. Corresponding bits between subkeys are XOr’d (fastest computer function) in a
vertical function. RSA one way function as well as smaller foot printed elliptical curves
is that mathematically you can’t go backwards and factor or do a mathematical short cut.
It is all this math that creates unnecessary overhead and why the keys they still use are so
dinky. Our way way function that even lay people can understand are a few fold:
o Two bytes of first key stream are run through an S box and only one comes out. It
is impossible for a hacker to accurately guess two bytes of information accurately
from one byte of information going backwards.
o It is impossible for a hacker to know the number and size of subkeys used.
o The process is more mechanical than mathematical. But if it was mathematical
then the only way they would begin to approach breaking it down would be if the
subkey sizes were only in either ascending or descending lengths. Make a key and
see that you don’t have to follow a pattern.
4
Nokia Key Whitenoise Downloads Summary document
o The subkey lengths are themselves populated with random data from another WN
key.
o The keys are used dynamically and change so there never is enough time for bad
guys. Simply set the rate of change to whatever time frame you want. The key on
Black Hat Challenge is changing every 15 seconds. It could be every second etc.
o When you don’t use WN keys for encryption, then there is NO cipher text that can
be used.
Whitenoise Multiplicity
Calculating length of key stream
Calculating strength of OTP key
5
Nokia Key Whitenoise Downloads Summary document

Picture 3 – this shows multiplicity.
o The length of a WN key stream is determined by multiplying the lengths of the
subkeys used.
o The strength of a WN key is determined by adding the lengths of the subkeys and
multiplying by 8 bits per byte. The picture shows a key stream of 100 billion
bytes and only 158 bytes of key structure need to be stored or transmitted.
How does DIVA work?
6
Nokia Key Whitenoise Downloads Summary document
7
Nokia Key Whitenoise Downloads Summary document
8
Nokia Key Whitenoise Downloads Summary document
What is DDKI – Dynamic Distributed Key Infrastructures?
Cyber attacks that are prevented and why?

DIVA operates as a dynamic one-time-pad where a single key can create an infinite
number of one-time pads, the only mathematically proven key technology. There is a
copy of a key and its last dynamic offset at both the endpoint and the server. The keys are
either synchronized or not. The dynamic offsets have to be identical. If not, the system
automatically disables the account without human intervention.

Man-in-the-Middle attacks are prevented because there is no key exchange

Side Channel attacks are prevented because all operations are order 1 after key load and
because there is no access to the key

Botnet attacks are prevented by configuration with server so the botnet never has access
to all the key material.

Quantum computing attacks are prevented because every variable is variable and that
along with brute force attacks are prevented because the keys can’t be factored.

Denial of service attacks, I believe, can be prevented by exploiting unbreakable identity
and secure network access so that hackers could never get on a network.
9
Nokia Key Whitenoise Downloads Summary document
Historical problems solved of large scale distributed systems

Traditionally one had to store the square number of keys of the number of endpoints. For
example, a distributed secure system with 10 endpoints would need to store one hundred
keys. There is a one to one relationship between endpoints and Whitenoise keys.

Using long keys is better than using small keys but storing them and transmitting them
became problematic. With Whitenoise multiplicity, one can store or transmit key
structure information easily. 158 bytes of key structure information will create a key
stream greater than 100 billion bytes long.
Whitenoise as a Random Number Generator
Microsoft and PGP are said to be moving away from NIST RNG modules because they are not
random enough and are causing security problems right out of the gate. WN is a perfect,
deterministic random number generator ideal for other traditional crypto, quantum computing
and quantum crypto.
Create and speed test a Whitenoise key
Download key creation utility here:
http://www.wnlabs.com/downloads/WNspeedUtilitydemonstrator.zip
See how to use it here: https://www.youtube.com/watch?v=9Ebgya6lxS4
Distributed Keys in turn distributing more distributed keys
This is a way of securing communications by implementation of Key Vault and Gatekeepers at the data
link layer:
http://www.wnlabs.com/Tunnel_Distributed_Keys_distributing_more_keys.pdf
How do you securely perform key exchange?



Level 3 or 4 Identity proofing like handing someone their passport.
Put firmware in chips or devices at time of manufacturing.
Electronic distribution – you can use Diffie Hellman or SSL if it makes one more
comfortable. Bottom line is that after electronic key distribution DIVA/test can assure
10
Nokia Key Whitenoise Downloads Summary document
key hasn’t been stolen, captured or spoofed. At this one time distribution, enrollment,
authentication, money collection and activation is performed.
Please see the link below and the paper below for electronic key distribution.
http://www.wnlabs.com/Presentations/Bringing_in_Legacy_Appliances_to_Secure_Networks.pps
Whitenoise, DIVA and DDKI work seamlessly with PKI

We designed the implementation of WN and DIVA to work seamlessly with PKI. This
creates a two channel (asymmetric and symmetric) multi-factor challenge to hackers
where one of the keys is dynamic and they have to break two keys in different
frameworks for each and every hacking attempt.

We encourage that designers continue using ISO-IEC approved modules. We will just
protect it. We don’t need to do encryption which usually gets FIPs because you are
altering data. Anyone can keep using whatever they have and we will protect the system
by preventing the PKI technology from getting broken in the first place without our
detection. Designing this way overcame much of the nonsense we have had to deal
with. The approved modules satisfy all mandates. WN/DIVA is then just an add-on. At
worst we are neutral and everyone is still in all compliance.
Characteristics of a One Time Pad



The key is random
When used for encryption the key is larger than the data encrypted
Any key (token) is only used once
Characteristics needed by a networked device



Connectivity
A little bit of storage space for key structure and current dynamic offsets
Write back capacity to track current dynamic offsets
How do you ensure the one time pad is truly random
If the key is random (that is distributed once) then any token used is random.
11
Nokia Key Whitenoise Downloads Summary document
Make a key and test it yourself. Encrypt a file. The fastest layman’s test is to just try to
compress or zip a key or encrypted file. Compression doesn’t work on random data.
Read UVIC performance analysis paper.
For streaming purposes in general, how do you authenticate the encryption?
It is authenticated encryption (now we are using the key for encryption). Everyone has a unique
key. Each stream is uniquely encrypted. No accelerators needed etc. You can also attach
headers where tokens are used for various identification purposes. See:
http://www.wnlabs.com/Tunnel_Distributed_Keys_distributing_more_keys.pdf
How do you securely perform key exchange?




Level 3 or 4 Identity proofing like handing someone their passport.
Put firmware in chips or devices at time of manufacturing.
Electronic distribution – can use Diffie Hellman or SSL if it makes one more comfortable.
Bottom line is that after electronic key distribution DIVA/test can assure key hasn’t been
stolen, captured or spoofed. Then you do distribution, enrollment, authentication how
you choose, money collection and activation:
Please see the link below and the paper above.
http://www.wnlabs.com/Presentations/Bringing_in_Legacy_Appliances_to_Secure_Networks.pps
Whitenoise is designed to work with PKI and other security modules

We designed the implementation of WN and DIVA to work seamlessly with PKI. This
creates a two channel (asymmetric and symmetric) multi-factor challenge to hackers
where one of the keys is dynamic and they have to break two keys in different
frameworks for each and every hacking attempt.

We encourage that designers continue using ISO-IEC approved modules. We will just
protect it. We don’t need to do encryption which usually gets FIPs because you are
altering data. Anyone can keep using whatever they have and we will protect the system
by preventing the PKI technology from getting broken in the first place without our
detection. Designing this way overcame much of the nonsense we have had to deal
with. The approved modules satisfy all mandates. WN/DIVA are then just an add on. At
worst we are neutral and they are still in all compliance.
12
Nokia Key Whitenoise Downloads Summary document
Whitenoise and DIVA don’t just do encryption
Whitenoise and DIVA provide:

perfect identity

secure network access

continuous dynamic authentication

authorization

signature

non-repudiation

inherent intrusion detection

automatic revocation
Scientific achievements
http://www.wnlabs.com/technology/landmarks.php
Identity Based Cipher
We are an identity based cipher because everyone has a unique key so by definition they are
authenticated with their unique key and unique encryption when that is chosen to be used as
well.
13
Nokia Key Whitenoise Downloads Summary document
Validations
Security Analysis University of California Berkeley
http://www.wnlabs.com/pdf/Wagner_Security_Analysis.pdf
The security analysis was performed by David Wagner of the University of California Berkeley.
He has testified before congress. I particularly like his quote that says if there was a magic
computer that could do a trillion trillion calculations per second, and if there was a trillion trillion
of these computers spread through the universe, and if we waited a trillion trillion years that the
odds of breaking a WN key would be 1 over 2 to the 1300th power which is unimaginably small.
Plus a hacker won’t live that long.
Performance Analysis University of Victoria in British Columbia
http://www.wnlabs.com/downloads/UVIC_Performance_Analysis.pdf
Performance analysis was done by ECE Labs at UVIC. They goosed up the NIST test suite to
allow only one statistical error on randomness for every thousand rounds instead of allowing for
1 in every hundred rounds. They tested against a super computer array and there was not even 1
acceptable statistical error. We are orders of magnitude more random than radioactive decay, the
bench mark for randomness, and this serves key technologies well.
White House Invitation to the First National Cyber Leap Year Summit
http://www.wnlabs.com/news/leapForward.php
We were the only Canadian company invited by White House Office of Science and Technology
Policy and NIST; and one of only four foreign companies invited.
Booz Allen Hamilton Cyber Security Demonstrator
http://www.wnlabs.com/technology/booz.php
Booz Allen Common Criteria Labs
http://www.wnlabs.com/technology/booz.php
$100,000 Whitenoise Challenge
14
Nokia Key Whitenoise Downloads Summary document
http://www.wnlabs.com/news/challenge.php
$100,000 challenge where we put our money where our mouth is.
$200,000 Challenge That Black Hat Would Not Take
http://www.wnlabs.com/news/challengeDEFCON.php This is currently on going until August.
European Telecommunications Standards Institute Presentation
http://www.wnlabs.com/news/standards.php
United Nations International Telecommunications Union presentation
http://www.wnlabs.com/news/UN_ITU.php
15
Nokia Key Whitenoise Downloads Summary document
Business
Downloadable presentations, demo software, and market research
Including

Secure cargo

Secure credit cards

Secure streaming

Market research
http://www.wnlabs.com/technology/presentations.php
Businesses lines





Certificateless authentication
Licensing RNG
Licensing WN Technologies
Products
Services
Protecting the Cloud Business Plan with social media hacking
This is a project/modular based bottom up business plan for securing the cloud. It gives a good
development timeline. It was written by a person who was in charge of disruptive technologies for General
Dynamics UK.
http://www.wnlabs.com/bp.zip
Export License
This is an EU plus 5 export licence.
Export EU plus 5 runs through EXCOL and EXCOL gets permission from CSE
Planned ITAR certification

ITAR certification in the UK (only $10k) rather than the $250 k that Electronic War Fare
Associates want.
Current business initiatives

Build in Canada Innovation Program (BCIP).
16
Nokia Key Whitenoise Downloads Summary document

Public Private Partnerships/R&D Partnerships Group/DHS Science & Technology Directorate

eCrypt Technologies – CEO is now Dr. Thomas Cellucci First Director of
Commercialization for the US Department of Homeland Security.

Global MobileTelecom Satellite and emergency communications project – prototype to
be built at UVIC

Cambridge Innovation Center MIT
o Canadian Cyber Security Accelerator

Perion Networks
They will pay $1 - $2.50 for every validated install through their developer and reseller
base in 60 countries and 240,000 developers who offer “free” software in order to
generate advertising revenue.
We are going to start off by offering a free email attachment encryptor just as Google is
offering a free email encryptor add-on. http://www.wnlabs.com/downloads/Easetup.zip
Directions:
http://www.wnlabs.com/downloads/Free%20Email%20Attachment%20encryptor%20DI
RECTIONS%20FOR%20INSTALL%20AND%20USE.pdf
Subsequently we will offer Personal File Security and the Hard Disk Drive Encryptor in
the same program.
17
Nokia Key Whitenoise Downloads Summary document
References
Dr. Abbie Barbir – Handles one of the questions at the UN ITU and is a Chief Systems designer for BoA
Thomas Cellucci – First Director of Commercialization for the US Department of Homeland Security and
CEO eCrypt
Brian O’Higgins – The Founder of Entrust Technologies
18
Download