02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Is Your Encryption Flexible Enough?<br />

Introducing the XOTIC Crypto System<br />

By Richard Blech, CEO, Secure Channels Inc.<br />

Introduction<br />

The science of modern cryptography utilizes mathematics as the basis for transforming information into<br />

an encoded secret that cannot be decoded or translated without the correct key. Encryption techniques<br />

are an essential cornerstone in the field of information security, whereby individuals, corporations, and<br />

governments wish to protect information and secure it from falling into the wrong hands.<br />

In the United States, the National Security Agency (NSA) has established strict standards for encryption.<br />

Today, block ciphers such as the Advanced Encryption Standard (AES), stream ciphers like RC4, and<br />

cryptographic hashing algorithms including SHA-256 are utilized worldwide as the basis for protecting<br />

everything from banking, to medical records, to very ‘private’ messages on social media’s What’s App.<br />

You may be surprised to know that the AES standard was established all the way back in 2001 and set<br />

as the US Government standard in 2002. As recently as 2016, significant progress was made in<br />

efficiently attacking versions of AES; however, few new standards have emerged since. Most of the<br />

world is still working from the same set of security tools that are approaching their 20 th birthday.<br />

So, if powerful standardized encryption methods have been easily available and essentially free to the<br />

public for decades, then why are there still so many hacks and data breaches that seem to be happening<br />

on a regular basis?<br />

There are answers to this question:<br />

Encryption can be extremely difficult to use effectively.<br />

Encryption can be extremely difficult to use effectively. If someone pressured you to hurry up and encrypt<br />

something right now, what would be the first tool that you reach for? If you were charged with protecting<br />

107

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!