(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-29721176-1', 'auto'); ga('send', 'pageview');

search:

The Solution

A single, unbreakable Whitenoise key creates an unlimited number of one time use keys. This provides a moving target defense that has never been breached.

Whitenoise distributed technologies prevent all cyber attacks and perform all network security controls with a single key.

FAQs


The Solution
How does it work


The Solution

A single distributed Whitenoise master key creates an unlimited number of unique and unbreakable keys that are given to all persons, mobiles and components on your network which are then continuously monitored and authenticated.

Security as a Service is a platform for SML businesses and general consumers. You can build a fast, economical, virtual, secure network server where you will be able to choose and customize secure services to protect your mobile and enterprise communications; privately stream data, secure cloud storage, secure data transfer and have 7 X 24 identity management and network monitoring. You decide whether you want a managed service or whether you have the server cloned and delivered to you.

Developers and manufacturers will be able to rapidly configure and test the security for your applications and products.


Back to Top


How does it work?

Whitenoise generates exponential keys that can never be exhausted and continually verifies identity by the one time use of moving tokens. Dynamic Identity Verification and Authentication prevents all cyber attacks and performs all security functions.

Both the server and the endpoint have an identical copy of the key. The server continually has the endpoint identify itself by sending tokens that are compared bit by bit. If they are identical, the session continues and both the server and endpoint update their current offset by jumping ahead in the keystream by the length of the token plus one. No keys have been transmitted and the server and the endpoint are synchronized.

Key characteristics

The key is an exponential deterministic random number generator (RNG) data source.

The Telco or service provider receives a master key (RNG).

The Telco can make an unlimited number of client account keys and distributes them to their customers or network endpoints one time.

The unique, private, account keys create key streams of unlimited length and are deterministic RNG themselves. (Key structure storage requires little space.)

The unique, endpoint, distributed, private keys create an infinite number of unique one-time-pad tokens (small key subsets) from that one-time-distributed key.

We know where each key-based cryptographic call or control is being called from in the key stream by tracking current dynamic offsets. We track different current dynamic offsets which are pointers or indexes into the key stream for each different, key based, network security control

•  The keys and tokens can be of ANY bit strength.

•  Smaller tokens for authentication can be safely used because DIVA operates as a dynamic, continuous, one-time-pad.

•  Because the keys are unique they provide authenticated encryption for storage or transmission with provenance and identity.

•  Because keys use the fastest function available on computers it is always as fast as the hardware.

•  Because the keys are bit independent they can be parsed for secure key storage separating key structure and offsets.

•  In hardware (like FPGAs) 2 bytes per clock cycle are processed. Speed is scalable by adding more threads. The fastest RSA algorithm (Spritz 2014) needs 24 clock cycles to process one byte. AES-NI needs 28 clock cycles per byte. Both Spritz and AES-NI are slow and computationally intensive.

• We can use the same key for any use endlessly because the keys are deterministic and of infinite length.

• Learn the logic that prevents each attack class.

Back to Top

 

 
2008 Whitenoise Laboratories Canada Inc.
Terms of Use | Privacy Statement