InvestorsHub Logo
Followers 30
Posts 6981
Boards Moderated 1
Alias Born 08/22/2008

Re: None

Saturday, 07/18/2015 8:07:05 PM

Saturday, July 18, 2015 8:07:05 PM

Post# of 76
CLOK.....

From the CIPHERLOC website....


How Does CipherLoc Work?
CipherLoc is the first truly affordable and secure, advanced Polymorphic Cipher Engine that can be used in commercial, security sensitive applications. More than just an obscuring algorithm, CipherLoc extends security without expending additional resources. It is the pinnacle of cipher technology. CipherLoc is infinitely configurable and mathematically provably secure.

CipherLoc is a Polymorphic Cipher Engine, a new type of digital technology that can defeat the electronic attacker by making the hacker have to defend himself against an attacking cipher and can simultaneously solve many security problems and increase reliability with a single strong solution. Encryption changes contain so little information that it is not possible to decrypt enough information to hack into the system. Thus a hacker cannot format messages and get into a system fast enough to take over the system or change messages in it. For the first time ever, the data needed to access or control an asset is safe from capture and misuse, making the asset more reliable and safe because hackers will focus on other targets instead of trying to break into CipherLoc protected facilities.

Conventional Wisdom used to protect an internet based data exchange from hacking is to make the information hard, if not impossible, for a hacker to read by utilizing a variety of different encryption techniques, or ciphers, that have key spaces (possible number of keys) assumed to be so large as to prevent an attacker from deciphering the data within the lifetime of the attacker. They also employ a secret "key" that is shared by those people who have legitimate access to the data. But, messages encrypted using these ciphers are readily broken because either the solution space is not as large as previously thought and/or the ciphers are susceptible to heuristic attacks such as a Brute Force Attack (trying every possible key). Making matters worse, "rainbow tables" (precompiled attacks) are readily available on the internet to speed up Brute Force Attacks. It's just a matter of probability for the hacker.

All of these types of attacks can be foiled using a single defensive countermeasure - CipherLoc
CipherLoc is an entirely new approach to the problem of encryption. It is a revolutionary idea based on the information content in a message rather than the difficulty of the key. Using advanced set theory and information theory, CipherLoc does not rely exclusively on large keys and complicated obfuscation techniques. This makes the algorithm faster and requires less memory than other forms of encryption. Other ciphers are broken more easily as hardware gets faster because it is easier to check all possible keys in the cipher key space. With CipherLoc, encryption speed increases as hardware gets faster. Thus, unlike other ciphers, CipherLoc becomes even safer as computers get faster. For the first time in IT history, messages and/or data needed to access or control an asset can be safe from capture and misuse, making any asset reliably private and completely secure. Hackers will be forced to focus on other targets rather than attempting to break into CipherLoc protected assets.

CipherLoc was created as an advance Polymorphic Key Progression Algorithmic (PKPA) Cipher Engine that achieves essentially the same security as a One Time Pad (OTP), the most secure cipher known, without all of the disadvantages.
CipherLoc is achievable in hardware, software, or a mix of the two.
CipherLoc eliminates dependence on a single type of cipher. Any pool of "strong" ciphers can be included in the system.
CipherLoc has an effective key space larger than 2.5x101500 per second and that key space is not subject to reduction due to isomorphs or language patterns which can affect all other encryption solutions by reducing their effective key space to as little as 15% of published specifications. With CipherLoc, at 100 MBps transmission rates, this means recording a GB of information to analyze every 10 seconds.
CipherLoc can be run as an independent program or added as a module to the program it secures. Operation is transparent to the end user. No new transmission protocol is needed because CipherLoc works on the contents of the packets and does not provide a "chosen plaintext" scenario for analysis.
CipherLoc works using the information content of the message and prevents a hacker from getting enough information to recover data.
CipherLoc keys are randomized from network traffic and it is ideal for internet or private network use and it works extremely well for Real Time Operating Systems and control systems.
CipherLoc prevents replay attacks because improperly encrypted messages are rejected. It can use any (and all) ciphers that are peer reviewed and judged to be strong.
CipherLoc changes block size randomly and it changes keys and/or ciphers at a rapid rate and random intervals.
CipherLoc gets stronger with hardware and software advances.
CipherLoc can be keyed to local or global entropy for additional security. It has no need for key distribution (like an OTP) since keys are electronically determined. CipherLoc automatically generates keys from randomized sources so that even if the first key is compromised the next one is not formed until the network provides the data. This prevents the so-called "rubber hose" attack.
CipherLoc messages are always different. Repeating messages does not result in the same encrypted text and the same letters in different slots encrypt differently.
CipherLoc works on all operating systems and for all computing environments. It allows you to have security as good as a government without the same cost and vast array of equipment.

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.