Cyber Defense eMagazine May 2019
Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Is Your Encryption Flexible Enough?<br />
Introducing the XOTIC Crypto System<br />
By Richard Blech, CEO, Secure Channels Inc.<br />
Introduction<br />
The science of modern cryptography utilizes mathematics as the basis for transforming information into<br />
an encoded secret that cannot be decoded or translated without the correct key. Encryption techniques<br />
are an essential cornerstone in the field of information security, whereby individuals, corporations, and<br />
governments wish to protect information and secure it from falling into the wrong hands.<br />
In the United States, the National Security Agency (NSA) has established strict standards for encryption.<br />
Today, block ciphers such as the Advanced Encryption Standard (AES), stream ciphers like RC4, and<br />
cryptographic hashing algorithms including SHA-256 are utilized worldwide as the basis for protecting<br />
everything from banking, to medical records, to very ‘private’ messages on social media’s What’s App.<br />
You may be surprised to know that the AES standard was established all the way back in 2001 and set<br />
as the US Government standard in 2002. As recently as 2016, significant progress was made in<br />
efficiently attacking versions of AES; however, few new standards have emerged since. Most of the<br />
world is still working from the same set of security tools that are approaching their 20 th birthday.<br />
So, if powerful standardized encryption methods have been easily available and essentially free to the<br />
public for decades, then why are there still so many hacks and data breaches that seem to be happening<br />
on a regular basis?<br />
There are answers to this question:<br />
Encryption can be extremely difficult to use effectively.<br />
Encryption can be extremely difficult to use effectively. If someone pressured you to hurry up and encrypt<br />
something right now, what would be the first tool that you reach for? If you were charged with protecting<br />
107