The real secret to keeping data confidential and secure is protecting it in the network. This is accomplished by hiding data in time and space using multiple data streams. These streams are made possible by using a Vernam Cipher (aka One Time Pad) that requires a stream of random, non-repeating data to be used. This stream of random data can be sent ahead of the message itself and, using polymorphic networking Moving Target Defense (MTD) techniques invented and developed at IN, a physics jigsaw puzzle is created.
StealthComms also uses the strongest encryption known so, even if the data is discovered, it is encrypted in a way that has no known exploits. The encryption used, a Vernam Cipher, is the base concept behind most encryption commonly used today. The difference is, with current encryption, the “Pad” or ciphertext is calculated. A “key” or pair of “keys” is used so each side will be able to generate the same, identical “pad” for encryption/decryption. The issue is, anything that is calculated can be solved for. With a Vernam cipher, the “pad” is actual random data derived from real world sources, like minute temperature variations, that can not be guessed or solved for. Simply put, anything that can be calculated can be solved for, but encryption using measurement instead of calculation provides a solid defense against even quantum computing.
The Vernam Cipher has a very simple mathematical proof:
x + y = z
The data z can not be solved for without knowing both x or y. The value x is our decrypted data so it’s never exposed to the network. So, how do we keep someone from discovering y, the “Pad” of random data, and z, the encrypted message, on the public Internet? This has been a long standing key distribution problem of network security that, with STOP’s polymorphic networking MTD technique, Introspective Networks has solved.
To accomplish this, the information is hidden using a virtual “shell game”. For a malicious Hacker to accomplish a man-in-the-middle attack, they need to attach to a known network port. To defeat this, a StealthComms session is, right from the start, connected on an unknown port. Starting the session this way makes interception and/or injection of data difficult, if not impossible. To increase this security further, the ports are only open for milliseconds and then randomly rotated periodically making deciphering what belongs to what in the conversation even more complex. Lastly, the random data “pad” is encrypted with conventional encryption across a separate data channel also utilizing an unknown, rotating port. The pad, in a sense, encrypts the asymmetric encryption making it mathematically impossible to crack by itself with any confidence. The pad is also sent at various, random times making the entirety of “Pad” (y) and encrypted message (z) hard if not impossible to distinguish and put back together.
To make this even more infeasible to crack, the data itself is actually double encrypted with two pads. Even if someone were to capture the data, get it in the right order and bytes align it correctly (that’s right, you have to align from the time and space puzzle to the correct byte), you would be solving for an unknown…another encrypted pad. No other messenger available has this level of network data security. It’s a virtual Smoke Screen in the network for your data.
For more information on STOP, please reference the patents backing the technology: USPTO #8,995,652, #9,584,313 and #9,584,488.
Android, Google Play, and the Google Play logo are trademarks of Google Inc.
Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc.