KEY CREATION AND SPEED TESTER for WINDOWS
Create exponential one-time-pads of any size. Test the speed on different Windows machines. The algorithm goes as fast as the processor is able.
WHITENOISE MEDIA STREAMING DEMO FOR WINDOWS - download and install the following three components.
This demonstration is Windows based and works with Media Player Classic which is an open source media player available here: https://mpc-hc.org/ Download and install this player for the demo.
Whitenoise Media Streaming Demo - Download and unzip the file. Open the Help File and follow directions to extract a media key to a USB drive for testing and play. Extract and install a filter and codec for Media Player Classic to be able to play Whitenoise encrypted media files.The media player will play media directly from an encrypted state.
Encrypted video BCIT - Download this Whitenoise encrypted media file from British Columbia Institute of Technology for testing. Unzip the file. It will create a DEMO_VIDEO folder. Go in the folder and right click the BCIT_VIDEO file and Open with MPC.
If the key on the USB is in the computer the file will play. If the key is not present it will not play. If the USB key is removed while encrypted media is playing the buffer will clear and the video will stop because the key for decryption is not present.
All presentations, demonstrations and white papers are linked to this page.
Archived Presentations (not in alphabetical order)
- Stop WikiLeaks full description
- DIVA IFSEC Future of Security Grand Finalist - Raytheon sponsor
- AT&T Certifies Secure File Interchange 2
- WNL a 2010 Grand Finalist Global Security Challenge
- United Nations April 2010 standards presentation: Harmonizing identity and privacy
- WN Speed and Randomness Tester Academic use only
- European Technical Standards Presentation Workshop Jan 2012 Sophia Antipolis, France
- Nokia Innovative Ideas Challenge
- Technical Advisory Committee questions Washington DC
- Whitenoise Vision for international harmonization of identity and privacy
- National Operational Requirements Document
- Government rescinds policy requiring PKI for secure services
- Whitenoise is a sponsor for the BCIT smart grid
- US National Leap Year Summit 2009
- White House Invites Whitenoise to Cyber Security Leap Year Summit
- US Operational Resource Document
- In Denial:Code Red 2 nd Annual Critical Infrastructure Conference
- Government Mandated Identity Management Keys a protocol
- AT&T Invites Whitenoise Laboratories (Canada) Inc to Join
- Sierra Wireless Stops Identity Theft and Secures Networks
- Sierra Wireless Stops Media Theft and Secures Cargo
- Paper on Whitenoise 3 Byte Substitution (PDF)
- Dr. Issa Traore
- Dynamic Distributed Key Infrastructures
- A Scalable Identity Management and Authentication Architecture
- In Denial: Code Red Digital Winter - The Failure of Critical Infrastructures
- Stop Credit Card and Identity Theft
- Dynamic I dentity Verification and Authorization
- Bringing in Legacy Appliances into Secure Networks
- The Security Summit Contest Presentation
- Tunnel Distributed Keys distributing more distributed keys at the data link layer
- Total Cost of Ownership Comparison
- Telecom/Enterprise Service Offering Secure File Interchange
- Subsequent Telecom/Enterprise service offerings
- The Value Chain for the Telecom Industry
- Secure File Interchange Total Cost of Ownership Total Cost of Ownership Comparison Public Key Infrastructure versus Identity Based Encryption versus Pretty Good Privacy versus Dynamic Distributed Key Infrastructures
- PKI Research Materials
- Critical Insights and Differentiators of Whitenoise Csinger
- Hard Disk Drive Encryptor and Streaming Demo - zip
- Download the BCIT Whitenoise encrypted media file for a demo
- BCIT_VIDEO_Encrypted with Whitenoise
- Secure File Interchange 2 with AES- pps
- Computer File Security Narrated Demo - pps
- Secure File Interchange Narrated Demo - pps
- Secure File Interchange Administrator functions - pdf
- WN Speed and Randomness Tester
Randomness is an important element of encryption. Take any of the trial or commercial applications and test the encrypted files. Go to the following web site and follow the testing directions. This site uses radioactive decay as a random data source as a product. http://www.fourmilab.ch/hotbits/ At this site you can rapidly (just a minute or two) perform at least 6 tests evaluating the randomness of encrypted data. Compare the results of these tests with the Whitenoise random data file attached with the results achieved with a chunk of encrypted data using any process you currently employ, or compare the results against those achieved on the Hotbits site. Testing results from extensive randomness testing against the NIST test suite is available from the University of Victoria.