{"id":32503,"date":"2017-07-12T10:42:03","date_gmt":"2017-07-12T14:42:03","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/industry-firm-patents-new-cyber-encryption-technology-defense-systems.php"},"modified":"2017-07-12T10:42:03","modified_gmt":"2017-07-12T14:42:03","slug":"industry-firm-patents-new-cyber-encryption-technology-defense-systems","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/industry-firm-patents-new-cyber-encryption-technology-defense-systems.php","title":{"rendered":"Industry firm patents new cyber encryption technology &#8211; Defense Systems"},"content":{"rendered":"<p><p>    Cyber Defense  <\/p>\n<p>    A private sector firm is offering a new kind of reinforced    encryption technology for the U.S. military services to    safeguard mobile phone, radio and computer transactions from    brute force cyberattacks.  <\/p>\n<p>    The Internet Promise Group has used internal funding to patent    a new technical method of securing encrypted military    communications by implementing, integrating and changing random    bits with an existing encryption key algorithm.  <\/p>\n<p>    The idea is to strengthen existing encryption keys to make them    less vulnerable to brute force attacks where adversaries or    cyber intruders use computer algorithms to try multiple    combinations of keys until the details are discovered and the    key is broken, said Tara Chand, founder and CEO of Internet    Promise Group.  <\/p>\n<p>    Brute force attacks, which require both substantial    coordination and sophistication, are typically thought to be    associated with major cyberattacks from near-peer adversaries,    such as Russia or China.  <\/p>\n<p>    We want to figure out a way to make the key so strong that you    cannot break it, he said.  <\/p>\n<p>    Chand explained that his firm has patented Random Dance Keys, a    new class of military encryption technology engineered to be    impenetrable to brute force cyberattacks.  <\/p>\n<p>    Random Dance Key innovation is based upon its focus on the key    space itself rather than encryption algorithms, to provide    ultimate defense and protection of critical data and    communications. This patented, advanced key management system    employs heuristic random wave envelopes derived from the three    different types of waves to yield a perpetual sequence of    random vectors, Chand added.  <\/p>\n<p>    Random Dance Keys, Chand explained, are able to change    encryption keys with every data package by using a new random    sequence of bits. Random keys are used and then discarded.  <\/p>\n<p>    Every time you have a data package, you come up with a random    key and integrate that with an algorithm and encryption key you    already have. You leave them as they are, he added.  <\/p>\n<p>    The Internet Promise Group is now in the process of introducing    this technology to the U.S. military services. Early    conversations are underway, Chand explained.  <\/p>\n<p>    Current U.S. military concerns about cyber intrusions are    heightened by recent revelations of Russian hacking and Chinas    previous record of hacking U.S. military databases.  <\/p>\n<\/p>\n<p>      About the Author    <\/p>\n<p>      Kris Osborn is editor-in-chief of Defense Systems. He can be      reached at <a href=\"mailto:kosborn@1105media.com\">kosborn@1105media.com<\/a>.<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/defensesystems.com\/articles\/2017\/07\/11\/encryption.aspx\" title=\"Industry firm patents new cyber encryption technology - Defense Systems\">Industry firm patents new cyber encryption technology - Defense Systems<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cyber Defense A private sector firm is offering a new kind of reinforced encryption technology for the U.S. military services to safeguard mobile phone, radio and computer transactions from brute force cyberattacks<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32503","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32503"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32503"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32503\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}