The company estimates that 75 percent of the 155 hackers who had to sign a 26-page agreement of the contest's rules did attempt to crack a secret encrypted file that held a virtual key to a 2014 BMW 320i Series Sedan courtesy of Irvine BMW. But when the conference closed at
"It would take a supercomputer making 19 quadrillion calculations per second at nearly 30 times the age of the universe to break the encryption of Secure Channels PKMS2," said
Secure Channels' PKMS2 (Pattern Key Multi Segment,
•The usage of third party libraries enabling the process to be extensible to any future development in encryption patterns. Secure transmission and storage of data in a network or via mobile devices.
•Breaking a file into segments and encrypts each segment individually while encrypting data and increasing the time to encrypt and decrypt a file by only 20 percent from AES 256 standard. PKMS2's strength rises exponentially with the number of keys used and patterns chosen.
•The protocol/password used per segment is based on a pattern key and can be as simple or complex as necessary for authentication. An entire data file of any type (a photo, a song, a video, or a document) can be a password depending on what the user wants.
Secure Channels' SPHERE technology combines the following into a cohesive process for mobile devices:
•Current encryption standards (e.g. AES256) together with the company's own patented protocols based on PKMS2. •Secure Channels' mathematical encryption models with more than 350 patterns and an encryption oriented scripting language together with optional customer encryption processes. •An unbreakable standard that is unparalleled in the industry. By crafting scripts that start where most cybersecurity tools finish, such as FIPS compliance, Secure Channels can provide the flexibility of minimal security for FIPS compliance to the company's maximal security of a virtually impenetrable nature. •Customers can inject their own encryption standards into the Secure Channels process pipeline thus assuring that their data is theirs alone. •Enable encryption from endpoint to endpoint, covering data storage through transmission, while making the Cloud safer than a military data center.
Dan ChmielewskiMadison Alexander PR 1-714-832-8716 1-949-231-2965 Email: Email Contact