At the beginning of the millennium it was already obvious that we were losing the cyber war in the new digital age. Public key, asymmetric networks were always vulnerable to Man-in-the-Middle Attacks, and the “bad guys” knew it and were using it to compromise our security and privacy in e-commerce, e-government, and e-health services upon which we were dependent. Our critical infrastructures, and in particular our telecommunications and data infrastructures, were being breached at exponentially accelerating rates. WikiLeaks is a painful reminder of cyber vulnerability. A new paradigm, a new protocol, and a new way of looking at secure “network-of-networks” paradigms was imperative.
At that time, Whitenoise Laboratories (Canada) Inc. invented Dynamic Distributed Key Infrastructures and Dynamic Identity Verification and Authentication. It was immediately recognized that these were national security level key technologies. The results of the first formal evaluation of the key based algorithms were stunning. The University of Victoria did not even generate a single statistical error in randomness of keys and data output when tested on a super computer array against the National Institute of Standards and Technology test suite.
This had never occurred before. Such fundamental computer science advancement was immediately recognized internally, nationally and internationally. Whitenoise was appointed to every national and international standards group that was pertinent. A global patent strategy was successfully completed with patents being granted in countries with two thirds of the world’s population and economic activity.
Around the same time a security analysis was done at the University of California, Berkeley. There are no known attacks against Whitenoise. The study concludes that if there was a magic computer that could do a trillion-trillion calculations per second and a trillion-trillion such computers were spread throughout the universe and if we waited a trillion-trillion years then the odds of breaking a Whitenoise key would be approximately 1/2 to the 1300th power which is unimaginably small.
The White House Office of Science and Technology Policy invited Whitenoise Laboratories (Canada) Inc. to participate in the first National Cyber Leap Year Summit. The United Nation’s International Telecommunications Union and the Commonwealth Telecommunications Organization invited submissions and presentations to their bodies. Dynamic Identity Verification and Authentication and Dynamic Distributed Key Infrastructures was globally recognized as a Grand Finalist in the Global Security Challenge Cyber 2010 and the IFSEC Raytheon Future of Security 2011 international competitions.
Invitations were made through the Canadian Embassy in Washington DC to present these technologies to the leading US security and intelligence departments. Broad-based permits for the export of these technologies were granted by the Government of Canada including the ability for enterprises and governments to create their own keys. It was quickly certified by AT&T.
Now as the internationalization of these technologies ensues, and partnering and licensing progress quickly, another major scientific milestone has been achieved. A seventeen month, NSERC Canadian government funded project at the University of Victoria has confirmed that these technologies are resistant to the entire Side Channel Attack classes.
Secure identity based networks are now propagating themselves to fix the fatal flaws of network-to-network security. This will ensure that governmental, enterprise, and personal data is protected in all contexts. It will make all communications secure.
Secure communications, secure cloud computing, and a more secure world are inevitable.