02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

an entire enterprise or organization, then what? If you’re like many others, these questions could make<br />

you stop and think for more than just a few moments. It takes a significant degree of technical expertise<br />

and knowhow in order to effectively integrate encryption into regular business operations and workflows.<br />

Ciphers are generally rigid and single-purpose-driven.<br />

Ciphers are generally rigid within their specified modes of operation and could be characterized as<br />

purpose-driven. For example, there is a reason that Daniel J Bernstein gained significant acclaim on the<br />

worldwide academic stage with his introduction of ChaCha20 and Salsa family of XOR-based streaming<br />

ciphers. Simply stated, the AES standard (in its various modes of operations) and other block-ciphers<br />

like it are far less performant when it comes to handling streaming media. Why else would it have<br />

captured the attention of big players like Google? At the same time, hardware performance boosts<br />

available to the AES family of ciphers propel it ahead of ChaCha20 when it comes to large datasets and<br />

file-based encryption. AES encryption benefits massively from the inline hardware acceleration that are<br />

now commonly included in most Intel Chips. In other words, one flavor of encryption does not fit all<br />

applications.<br />

What if you could have it both ways?<br />

What if you could have it both ways? In <strong>2019</strong> Secure Channels Inc. launched the ground-breaking<br />

XOTIC cryptosystem; a hybridized streaming / block cipher with a “dialable” (user configurable)<br />

encryption strength. With less than 1millisecond initialization time, XOTIC is more than 99% faster than<br />

AES-256 when encrypting small to modestly-sized data, and blazes past ChaCha20 when encrypting<br />

streaming media. XOTIC operates at a minimum of 512bit strength and can be easily “dialed-up” to<br />

extreme levels, leaving behind all other block cipher encryption algorithms.<br />

Flexibility is an essential aspect and goal in next generation encryption.<br />

Flexibility is an essential aspect of modern computing platforms and XOTIC delivers on that challenge.<br />

XOTIC has recently been deployed to the general public as an email encryption plugin for Microsoft<br />

Outlook Office 365, a Windows shell-integrated ZIP utility, and an encryption-as-a-service website. It’s<br />

been embedded into hardware used by the Hollywood film and entertainment industry, as well as into<br />

discrete military applications. Later this summer, XOTIC will be deployed and made available for<br />

download at the Apple Store in IOS native apps, Google Play for Android. Products scheduled for release<br />

in <strong>2019</strong> even include a ground-breaking new streaming video communications platform.<br />

There’s really no true privacy without a better encryption model.<br />

Did you know that when you initiate an online chat or video-call with many of today’s popular instantmessaging<br />

apps, you are actually only establishing standard (mathematically reversible) PKI-based<br />

encryption keys once? Many apps do this only at the time an application is started. This begs the<br />

question, “how many different people did you chat with while your instant messaging application was<br />

open?” Knowing that all of those ‘private’ conversations are taking place on the same breakable<br />

asymmetric cipher leaves us feeling uneasy. This is in part what prompted Secure Channels to deploy<br />

XOTIC into streaming chat apps. Faster XOTIC encryption enciphers (and generates new keys) for every<br />

individual video frame and audio packet of a high-definition video contained in a streaming online chat<br />

conversation, and without any loss in fidelity. The difference in the level of security protection compared<br />

108

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!