w hite n oise e ncoding people believe that every computer system can be “cracked.” yahoo,...
TRANSCRIPT
WWHITE HITE NNOISE OISE EENCODINGNCODINGPeople believe that every computer system can be
“cracked.”Yahoo, Twitter, and
even the large computer security
firm, RSA,can attest to this,as they have all been hacked
at various times.
Those believing computers Those believing computers can never be secure ARE can never be secure ARE
WRONG.WRONG.
They also never thought alight bulb could exist,
but Edison invented one and amazed the world.
He proved they were wrong.
CYBERTHREATS ARE CYBERTHREATS ARE DANGEROUS . . .DANGEROUS . . .
Cyberhacking is now considered
to be the most dangerous threat to most private,
governmental and defense sectors in the modern world.
CYBERTHREATS ARE CYBERTHREATS ARE REAL...REAL...
Major companies have experienced cyber
hackingand lost important
company as well as customer
information.
CYBER-HACKERS THREATEN CYBER-HACKERS THREATEN THE FABRIC OF OUR THE FABRIC OF OUR
SOCIETYSOCIETYGovernments like the U. S. have encountered outside
forces and groups who have attempted to break
into their secure computers containing essential information.
What are potential effects What are potential effects of CYBER-HACKING?of CYBER-HACKING?
Banks could lose control of customers' and their funds. Power companies could be
turned off. Defense missiles could be compromised...
AND MORE.
WHAT DOES WHAT DOES WHITE NOISE WHITE NOISE OFFER TO PROTECT US? OFFER TO PROTECT US?
White Noise offers a solution to the threat of cyber-
hacking that is guaranteed to keep information safe and secure from harm.
WHITE NOISE is YOUR WHITE NOISE is YOUR SECURITY...SECURITY...
White Noise will give peace of mind by ensuring that important computer-stored
information remains private
and untouched.
How Does How Does WHITE NOISE WHITE NOISE Propose To Offer What No Propose To Offer What No
Other Other System Has—Complete System Has—Complete
Security? Security? Consider This: Can you disprove that a2 + b2 = c2 for
any right triangle?
b
a
THIS IS WHAT WE NEED.THIS IS WHAT WE NEED.
Why not create a computer system that is as
uncrackable as a mathematical proof?
Why Do All Cyber Security Why Do All Cyber Security Systems Fail Sooner or Systems Fail Sooner or
Later?Later?The Reason is: They use
a mathematical algorithm
to randomize the message
they are encoding. IT'S THAT SIMPLE.
What Is the Basic ConceptWhat Is the Basic Conceptof of WHITE NOISEWHITE NOISE ??
There are several stepsto ensure security....but they are totally
uncrackable when takenin proper sequence.
.
Here Are The Basic Steps:Here Are The Basic Steps:1st Step Place completely random
noise in a 64 gb flash drive
using a White Noise Generator (such as radio
static)..
The Basic Steps:The Basic Steps:
2nd Step Give the Transmitter one
copy of the random pattern
and give the Receiver a second copy.
.
The Basic Steps:The Basic Steps:
3rd Step XOR the message with random noise from the Transmitter key.
.
The Basic Steps:The Basic Steps:
Example of Encoding
Message: 11010101 Key: 01011101 Send: 10001000
.
The Basic Steps:The Basic Steps:
4th Step Decode the
transmitted and encrypted message at the
receiving end..
The Basic Steps:The Basic Steps:
Example of Decoding
Received: 10001000 Key: 01011101 Message: 11010101
.
THE END RESULT –THE END RESULT –A TOTALLY SAFE MESSAGE.A TOTALLY SAFE MESSAGE.
There is absolutelyNO WAY TO DECODEthis message without
having the Key.
.
THE VAULT: A VitalTHE VAULT: A VitalPart of the SystemPart of the SystemCentral to the security of
this system is a Vault that is
only connected to the Gate with 3 wires and
can onlysend and receive ASCII
characters..
WHY IS THIS SECURE?WHY IS THIS SECURE?
There are two importantand unique steps which
ensure that cyber-hacking
cannot succeed.
.
TWO PROCESSES ARE TWO PROCESSES ARE VITAL:VITAL:
ASCII and “The Gate”ASCII and “The Gate”At this step, the encryption
is in ASCII, ensuringthat no viruses can
pass...and encryption passesthrough “the Gate.”
THE GATE HOLDS THE THE GATE HOLDS THE “KEY”“KEY”
In sending messages between the Vault and the internet computer, information is safely
passed through a processer called “the
Gate.”.
How Is the Message SentHow Is the Message Sent to the Vault? to the Vault?
The Gate holds the key on a flash drive. It receives encrypted data from the
internet computer asynchronously and
passes it with an interrupt to the Vault .
.
How Is the Message How Is the Message Passed?Passed?The Gate receives data
from the Vault and passes it to the internet
computer in a similar manner. DATA CAN
NEVER LEAVE THE VAULT WITHOUT BEING
ENCRYPTED..
ALL MESSAGING IS ALL MESSAGING IS ENCRYPTEDENCRYPTED
NO DATA CAN PASS FROM THE INTERNET COMPUTER THROUGH THE GATE WITHOUT
PASSING THROUGH THE KEY.
.
How the Vault and Gate How the Vault and Gate WorkWork
The Vault cannot give any commands to the Gate.
The Gate program is only in permanent ROM
and has scratch RAM ONLY.
.
Diagrammatic Diagrammatic RepresentationRepresentation
.
GATEVAULT INTERNET
KEY
IntRW
Ground Ground
W
RInt
<
<< <>>>
PowerPowerPower|| || ||Ʌ Ʌ Ʌ
FURTHER REQUIREMENTSFURTHER REQUIREMENTSThe computers must be
shielded from electromagnetic
radiation.No signal should be
allowed to pass between the power
supplies..
Copyright NoticeCopyright Notice
This is an original idea from the developer,
James T. Parker. [email protected]
May 9, 2013
.