155 Hackers took the “Can You Break This” Challenge; None Could Break Secure Channels’ New PKMS2® Patented Encryption Technology
IRVINE, CA, August 26, 2014 — Secure Channels Inc., an innovator in the development of patented encryption technologies that protect data in motion and data at rest, today announced that none of the 155 hackers at the recent Black Hat USA 2014 Conference in Las Vegas who participated in a “Can You Break This” contest were able to hack the company’s new patented PKMS2® Encryption Technology.
The company estimates that 75 percent of the 155 hackers who had to sign a 26-page agreement of the contest’s rules did attempt to crack a secret encrypted file that held a virtual key to a 2014 BMW 320i Series Sedan courtesy of Irvine BMW. But when the conference closed at 5 PM on August 7, no one had cracked the code.
“It would take a supercomputer making 19 quadrillion calculations per second at nearly 30 times the age of the universe to break the encryption of Secure Channels PKMS2®,” said Richard Blech, CEO, Secure Channels. “Data breaches do not just reside at the perimeter. The most serious breaches come unsuspectingly from within. Protect your data with certainty by enveloping it with impenetrable encryption which leaves the thief with only useless bits and bytes.”
The Secure Channels’ PKMS2® (Pattern Key Multi Segment, Multi Standard) technology uses available FIPS-certified third party encryption libraries to produce “unbreakable” communications and data files through:
- The usage of third party libraries enabling the process to be extensible to any future development in encryption patterns. Secure transmission and storage of data in a network or via mobile devices.
- Breaking a file into segments and encrypts each segment individually while encrypting data and increasing the time to encrypt and decrypt a file byonly 20 percent from AES 256 standard. PKMS2®’s strength rises exponentially with the number of keys used and patterns chosen.
- The protocol/password used per segment is based on a pattern key and can be as simple or complex as necessary for authentication. An entire data file of any type (a photo, a song, a video, or a document) can be a password depending on what the user wants.
Secure Channels’ SPHERE technology combines the following into a cohesive process for mobile devices:
- Current encryption standards (e.g. AES256) together with the company’s own patented protocols based on PKMS2®.
- Secure Channels’ mathematical encryption models with more than 350 patterns and an encryption oriented scripting language together with optional customer encryption processes.
- An unbreakable standard that is unparalleled in the industry. By crafting scripts that start where most cybersecurity tools finish, such as FIPS compliance, Secure Channels can provide the flexibility of minimal security for FIPS compliance to the company’s maximal security of a virtually impenetrable nature.
- Customers can inject their own encryption standards into the Secure Channels process pipeline thus assuring that their data is theirs alone.
- Enable encryption from endpoint to endpoint, covering data storage through transmission, while making the Cloud safer than a military data center.
Secure Channels Inc., has created a paradigm shift within the technology industry. Secure Channels Inc. is a cybersecurity firm leveraging robust, state-of-the-art patented encryption technologies and authentication solutions compatible with every type of data available today. Fostering innovative disruptive technologies while still being user defined has become a cornerstone for Secure Channels. Developing patented unique processes to harden encryption and envelop resources in such a way as to render the data unbreakable and useless to the hacker, leaving them with only bits and bytes. By using its Proximity Technologies and securing data through IoT Devices, Secure Channels will be delivering real time analytics, payment processing, and data collection to any mobile platform or device. Secure Channels provides impenetrable cybersecurity far in excess of any existing encryption systems available, you would have to go to the future to find such security and Secure Channels would already be there.