Encryption Beyond Mathematics

Data integrity can mean the difference between success and failure,
privacy and ruin, and in some cases, life and death.

From corporate espionage to identity theft to altering hospital medical records, hackers wreak havoc on lives and businesses. Financial loss and identity theft are only parts of the picture. The FDA has now warned that 400,000 hospital pumps that administer patient drugs could be remotely manipulated into delivering potentially fatal doses or stopping dose delivery entirely.

In a data-dependent world, you are only as competitive – and only as safe – as the data you can truly protect.

The Cost Of Data Breach – 2013-2015

  • Between 2013 and 2015, hackers stole personal, financial and health information of 92.3 million Americans from Anthem, Blue Cross/Shield and Premera Blue Cross/Shield.
  • 100 major world banks lost $1 billion to cyber thieves.
  • The Office of Personnel Management had information on 25.7 million federal employees and their families stolen.
  • AvMed paid $3.5 million to settle a class action lawsuit for failure to adequately protect data – the plaintiffs didn’t even having to prove damages.
  • FINRA publicly censured and fined financial services firm Sterne, Agee & Leach $225,000 for violations pertaining to the practices required by companies to protect data.

The High Price Of Failure To Protect Your Data

Not only do you lose the value inherent in your data, you are the one who gets penalized if the loss impacts others. Increasingly stringent rules, regulations and laws are being enacted and enforced to require companies, institutions, government agencies and even private citizens to protect information, one of the most valuable currencies on the planet. Unfortunately, conventional encryption is doomed to fail.

7Tunnels Versus Conventional Encryption

Convention Is No Longer Safe

While encryption is not the only element in the battle for cyber security and data protection, it may be the single most important. Even an “insider attack” can be thwarted if the insider with access doesn’t have the ability to break the encryption-protected data.

The problem is, advances in mathematics, computing power and hacking techniques are outpacing advances in conventional encryption. This is where 7Tunnels departs from conventional methods. In an increasingly complex world, 7Tunnels has embraced elegant simplicity. While almost all known encryption methods employ advanced mathematics, 7Tunnels has moved beyond this. Instead of layering on more and more mathematical algorithms, as others do, 7Tunnels has eliminated the mathematics and in its place uses “the power of random” to protect your most sensitive data.

7Tunnels: True Random Numbers Vs Pseudo-Random Numbers

The 7Tunnels method involves the generation of True Random Numbers as opposed to Pseudo-Random Numbers. True Random Numbers are based on events that are categorically unpredictable, such as radioactive decay, photon hits on a photon cell and others. Pseudo-Random Numbers are generated using algorithms that, regardless of how complex they may be, are still potentially predictable and discoverable.

7Tunnels: The Best Protection

Current encryption methods are math based and are therefore prone to cyber decryption courtesy of quantum computing’s extraordinary power, speed and ability to brute-force churn numbers until they break these codes. Because 7Tunnels is not math based, even quantum computing methods will have no impact on data protected by 7Tunnels’ superior encryption.

7Tunnels: Customized Solutions

7Tunnels is not one size fits all encryption. It seamlessly integrates into existing architecture depending upon the existing design. The uses of its method apply to all forms of digital data whether audio, video, data or executables; in all environments such as telephony, Industrial Control System or remote control/monitoring or computer networks; under all data states such as data in motion (communications) or data at rest (storage or backup).

Protecting Against Side Channel Attacks

Encryption, regardless of method or robustness, is not sufficient alone to protect information. What are known as “side channel attacks” such as social engineering, insider attacks, end point exploits and key management exploits, as well as other methods, can compromise information protected by otherwise strong encryption. There are many reasons for this. One is that much information resides in storage or at rest in plain text. Information that is not encrypted is vulnerable to any intruder.

7Tunnels has a number of ways to defeat these side channel attacks, starting with the power of its encryption. An intruder who intercepts a 7Tunnels document or information string cannot do anything with it, as it is impervious to brute force attacks and other methods of cryptanalysis. Because 7Tunnels is new, any hardware portion of it will not be vulnerable to legacy manufacturing exploits by government agencies.