7Tunnels Technology

Perfect secrecy. Quantum-proof security.

The 7Tunnels Solution

The 7Tunnels patented solution is a digital version of the perfectly secure one-time pad (OTP) system using true random numbers (TRNs) as the foundation for encryption keys. Each 7Tunnels device creates a secure tunnel to a dedicated cloud-based endpoint through which communications can safely flow. 7Tunnels protects emails, text messages, streaming video, VOIP calls, file transfers, and other communications by encrypting every IP packet flowing through the tunnel.

Tested and Proven

7Tunnels products have undergone extensive testing in both laboratory and real-world settings. The 7Tunnels AG7 system passed a rigorous proof-of-concept testing protocol outlined and contracted by Dupont. The process included four phases of ground-based and multi-continent, in-flight testing. Dupont and Corteva (the company formed from Dupont’s former agricultural division) now both rely on 7Tunnels to protect their important on-wing communications. A 2019 analysis of 7Tunnels technology by professors from Georgia Tech verified the encryption’s security. “We conclude that 7Tunnels correctly deploys the OTP cipher technology in a way that has been proven to be absolutely secure.” - Dr. Milos Prvulovic & Dr. Alenka Zajic

One-Time Pad: Perfect Secrecy

The one-time pad (OTP, also known as a Vernam System) has been repeatedly demonstrated to be perfectly secure, first—and most prominently—by noted American mathematician Claude Shannon, known as “the father of information theory.” Shannon’s seminal 1949 paper Communication Theory of Secrecy Systems proves that the OTP is unbreakable when used properly.

True Random Numbers: Beyond Math

The most critical component of the digital OTP application is the use of True Random Numbers (TRNs) to generate encryption keys. 7Tunnels generates TRNs using various fundamentally random physical processes (including photons impacting a semi-transparent mirror or atmospheric RF noise).
We use TRNG devices that capture the random output from these processes and provide random bytes for our RCPs.  We verify the randomness of the of the TRN output using Duke University’s Dieharder 3.31.1, NIST Statistical Test Suite SP 800-90B, NIST SP800-22 r1a STS Suite, TectroLabs Bitcount Test, and the Fourmilab ENT program. Using Ubuntu 17.10 running on a Windows 10 VirtualBox, the tests included only raw data without whitening or post processing. The results have consistently proven the entropy (mathematical randomness) of 8-bit bytes is 7.9+, which is the equivalent of “five nines,” or 99.999% random—as close to perfectly random as can be proven.

Secure Cloud Endpoints: Unrivaled Protection

7Tunnels devices pair seamlessly with cloud-based endpoints exclusive to each customer. After the initial connection (protected by AES256-GCM encryption) is complete but before any customer communications/data can be sent or received, 7Tunnels confirms the tunnel authenticity by exchanging a single data packet protected with 1,182-bit encryption.
Once that packet is successfully decrypted on both ends (using pre-shared keys that are never in transit or vulnerable to intercept), the tunnel is verified as secure and uncompromised. This handshake and confirmation process, in addition to the 7Tunnels proprietary data encryption, ensures authenticity, integrity and confidentiality of communications through each customer’s tunnel.