DEFCON Black Hat Challenge Clock

 

NO WINNER IN THE CHALLENGE THAT BLACK HAT WOULD NOT TAKE BUT DEFCON DID.

One year has now passed and no one from Black Hat, DEFCON or global hacking groups has been able to post or provide a successful break against a static Whitenoise key even with 1,000,000 bytes of key stream provided.

André Brisson commented, "There was very little risk for us in running this contest even with a static unchanging key and file. No one, including funded universities, government institutions and large corporate security business units has ever put a scratch on Whitenoise technologies and they have access to almost unlimited resources and computing power. It is needed now more than ever with 1.2 billion user names and passwords stolen."

"Unlike the simplified contest here with a static key and file, there simply is no way to successfully attack dynamic crypto, and in this contest the key has changed over 2 million times," said André Brisson founder of Whitenoise technologies. See the clock that is ongoing: http://www.wnlabs.com/news/DEFCON_Black_HAT_Challenge_Clock.php

----

This page is the official DEFCON count down page for the Whitenoise Challenge that Black Hat Would Not Take.

See why Whitenoise and DIVA (Dynamic Identity Verification and Authentication) is UNBREAKABLE:

Read and download a short executive overview of Whitenoise technologies.

The contest officially starts on August 15, 2013 at 12:01:01 a.m. PST.

This page will list the the number of contest participants (downloaded contest files), and be the count down clock for the contest.

After one year, the contest will offically finish.

"With the recommended parameters, Whitenoise uses keys with at least 1600 bits randomness. Exhaustive search of 1600 bit keys is completely and absolutely infeasible. Even if we hypothesized the existence of some magic computer that could test a trillion-trillion key trials per second (very unlikely!), and even if we could place a trillion-trillion of these computers somewhere throughout the universe (even more unlikely!), and even if we were to wait a trillion trillion years (not a chance!), then the probability that we would discuss the correct key would be negligible (about ½ 1340 which is unimaginably small). Hence, if keys are chosen appropriately and Whitenoise is implemented correctly, exhaustive key search is not a threat."

"After careful security analysis, I was unable to find any security weaknesses in the Whitenoise stream cipher. Whitenoise resists all of the attack methods I was able to think of. This provides evidence for the security of Whitenoise." David Wagner University of California, Berkeley and expert witness on cryptography for the US Congress.

https://forum.defcon.org/forumdisplay.php?f=755

http://www.wnlabs.com Go to the Home page and click on the Challenge Icon. (You should check the others out too for help.)

Thank you DEFCON

DEFCON Black Hat Challenge Clock

ABOUT
CONTEST RULES
REGISTER
HOME

 

Copyright © 2011 Whitenoise Laboratories (Canada) Inc. (WNL). All rights reserved. Whitenoise, DIVA, and DDKI are trademarks of Whitenoise Laboratories (Canada) Inc. in the US and other countries. DIVA, DDKI, WNL and other branding and related marks are the tradesmarks of Whitenoise Laboratories (Canada) Inc. or its affiliaters or subsidiaries or licensee in the US and other countries and licensed through Whitenoise Laboratories (Canada) Inc. Other names may be trademarks of their respective owners.

 

partners' logos