1 / 15

Whitenoise

Whitenoise. Data Encryption & Identity Management. Whitenoise Laboratories Inc. IP Whitenoise Encryption & Identity Algorithm US/International Patents Pending- (US) 2004 024 7116 IPEA advisory all 23 claims allowed (May 2005) Business Model Licensing of Technology to manufacturers

wilda
Download Presentation

Whitenoise

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Whitenoise Data Encryption & Identity Management

  2. Whitenoise Laboratories Inc. • IP • Whitenoise Encryption & Identity Algorithm • US/International Patents Pending- (US) 2004 024 7116 • IPEA advisory all 23 claims allowed (May 2005) • Business Model • Licensing of Technology to manufacturers • Sales of Whitenoise Labs developed encryption products (through distributors) • Fully compliant Cdn Federal Gov’t regulations • Vancouver Based

  3. Whitenoise Program Attributes • Extremely Secure - Keystream length exceeds the size of Data to be sent or stored (Keys built from small amount of stored data) • - Keystream Data never transmitted • Fast – 5 Clock Cycles per Byte (S/W) >2 Bytes / CC (H/W) – Done in FPGA • Key Set Up Time < 7 ms • Error Tolerant - Only damaged bits affected no reliance on preceding or following data • Efficient - Low Processor Requirements – Lower cost devices • Data Type Independent - Multimedia Support – Voice Data Video – Real Time streaming, Video Surveillance • Manages Linear Offsets - Strong Identity & Digital Rights Management Applications • - Receiver & Sender synchronized Keystream • Scaleable - Small Footprint < 300k – Will run on 8 bit cpu

  4. Whitenoise Positioning EncryptionStrength Strength Strong Whitenoise Speed AES Triple DES ( CPU/Processor Intensive) (CPU/Processor Very Efficient) Blowfish RC4 DES SEAL Weak Slow Fast

  5. xc2v1000 Whitenoise on an FPGA

  6. Whitenoise in Silicon • Xilinx xc2v1000 is rated at 1Million gates • one stream encoding used 3% of logic which is approx 30,000 gates • estimate would be 5000 ASIC gates for one stream encoding + 64 kB memory • Small footprint = low power consumption • Outputs can be ganged (if required) for very large data streams • Ex. Optical Carrier networks • OC 192 = 10 Gbps, OC 768 = 40 Gbps • Ex. Synchronous Digital Hierarchy (SDH) • STM-64 = 10 Gbps • High throughput • No latency

  7. Whitenoise in Silicon • Characteristics of FPGA • Low cost • High Speed Encryption/Decryption • 1.28 + Gbps • Channelized ( 2 independent channels ) • More Powerful Chips = Higher Speed/More throughput • Current Xilinx Chip $5-$10 (Volume) = 1.28Gb/s • Next Model Up ~$80 = 12.8 Gb/s • STM-64 = 10 Gbps • OC 192 = 10 Gbps • ASIC Implementation in 3rd Party Electronics

  8. Whitenoise & Data Storage • Does not increase stored file size • 256 bit offset/id • Bit for Bit encryption • Bit error tolerant • Only damaged bit corrupted • No relationship with bits preceding or following as with block ciphers • Compatible with data recovery schemes (RAID) • Extremely fast encrypt/decrypt function • No apparent latency Transmission • Efficient real-time transmission of large files (Financial) • Increased security • Keystream 1060 Bytes in length • Secures wireless transmission • Wireless networks Satellites

  9. Voice & Video • Data Independency allows pre-caching for optimal performance • Voice over IP or Wireless • No additional latency • Extremely fast • Secure • Keystream length exceeds the length of the conversation • Error tolerant • Interruption in transmission only affects the portion involved • Digital radio packet transmissions synchronizeable for error tolerance • Video • Real-time video encryption • Stored video not inflated by encryption • Instant access to any point in stored encrypted video file • First responders

  10. etc.-01100011001101001101010100101010000101011010101010-etc. +’n’ Dynamic Identity Verification Authentication (DIVA™)& The IDM Key Offset Terminal requests Access to encrypted content Server knows last session end point in keystream If additional Identity Verification required tells terminal to go ahead ‘n’ bits in key & send back ‘y’ bits If terminal can comply identity is verified & content is delivered Key Database Media Library DIVA remembers end point of this session Last Session Ended Here (‘X’) Terminal’s Whitenoise IDM Key

  11. Whitenoise & DRM • IDM - Positive identification of receiving device • Unique synchronized communication channel between data sender and receiver • Multimedia may be streamed and/or stored for later play • Key associated with terminal • Cannot be played on another device • Supports real time voice, video, music, text and games (yes games) • Never decrypted • Content encrypted once and placed on server • Title key sent uniquely encrypted in terminal key to user • Low overhead

  12. Whitenoise Delivers Games and Movies • Utilizes Central server(s) • Unique Identity Key assigned to subscribers’ Receiving Device • Uses Serial number or other unique Identifier + Whitenoise • Content is encrypted in Key for that title ( Game, Movie, TV Clip, etc.) • Subscriber requests download • Key for that title is sent to receiver securely encrypted in their unique identity key • Content is never decrypted even in storage on the device • Whitenoise fast enough to decrypt (play) on-the-fly (Demo kit available on request) Key Database Media Library Unique IDM Request Media Key + Content

  13. Whitenoise Delivers Voice and Text Key Database • Provider establishes data base of pre-engineered session keys • Cell phone/ PDA owner selects Session keys from list • Similar to Downloading Ring tones • Database contains user’s Serial #, NAM/Private Key pair • Session Key is sent encrypted using Private Key to user’s handset & decrypted • Prevents interception by third party • User notifies trusted party which Session Key he is using for them • They go to database and choose same key for communication with that individual • Keys are transmitted encrypted in their Private Key and decrypted • During secure call setup Session Key is selected and agreed upon between Cell phones PDA’s • Transmit/Receive orientation and offset is completed • Secure Session enabled without transmission of keys

  14. Whitenoise SDK-DDK • Our engineers will work with your team to integrate the Whitenoise module into your: • S/W application • Silicon • Add speed & security to your product • Invisible to the user • Protect the rights of your content provider • Contact: abrisson@wnlabs.com

  15. Whitenoise Data Encryption & Identity Management

More Related