SlideShare a Scribd company logo
1 of 55
TRUSTLEAP 
® 
The Need For Certainty 
Mathematically-Proven Unbreakable Security 
www.trustleap.com
This document is aimed at helping people to understand the TrustLeap technology. A 
cryptographic oracle (where users chose and submit the plaintext: an ASCII classic 
English book and a sentence that they type, an encryption key, the standard encryption 
algorithm to secure like AES or RC4, and get the ciphertext, with the sentence injected at 
a random position that they must guess to demonstrate that teir plaintext attack is 
successful) as well as further information regarding the internals of TWD Industries AG's 
technology are available under a proper NDA, to selected partners. 
2 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
3 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
I. Definition, 
Promotion, 
Reality
The Oxford Dictionary 
Encryption: to convert (information or 
data) into a code, especially to prevent 
unauthorized access. 
Origin: 1950s (in the US), from English 
'in' and Greek kruptos 'hidden'. 
4 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
Promotion 
“no one ever lost money to an 
attack on a properly designed 
[standard] cryptosystem” 
– Peter Gutmann 
5 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
Reality 
6 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
2007 – RC4 / WEP 802.11 
wireless standard 
Used to Steal 45 millions 
of Credit-Card Numbers 
Legal Costs: $40,900,000
Reality 
7 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
2010 – A5-1 / GSM Phones 
wireless standard 
Spy, Trace and Impersonate 
Billion of Mobile Phone Users. 
– Karsten Nohl
Reality 
8 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
2011 – GPRS / Web - Mail 
wireless standard 
Spy, Trace and Impersonate 
Billion of Mobile Phone Users. 
– Karsten Nohl
9 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
2013 – 3DES / SIM Card 
Javacard standard 
Steal data, Spy, Trace and 
Impersonate Billion of Mobile 
Phone Users. 
– Karsten Nohl 
Reality
Reality 
2013 – Design of $1.5 trillion F-35 
10 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Stolen From 
...Pentagon
Reality 
11 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
2013 – 96-bit secret key 
RFID car transponder 
Steal VW, Audi, Bentley, 
Lamborghini & Porsche cars 
as Megamos Crypto is broken. 
– Flavio Garcia
Reality 
12 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
2013 – Switzerland 
e-VOTE Forgery 
They know since 2002 what they 
do wrong... but 2012 audits still 
certify a flawed system. 
– advtools.com
Standard Encryption Is Broken, 
Routinely. 
But Experts Keep 
Saying: 
“It's Very Safe” 
13 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Reality
“Cryptosystem failure is orders 
of magnitude below any other 
risk.” 
– Peter Gutmann 
14 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Promotion
Reality 
15 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
2012 – X.509 Certificates 
“the Flame malware has been 
signed by forged PKI certificates 
to appear as if it was produced 
by... Microsoft.”
Reality 
16 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
The FLAME Malware 
Active Since Year 2000 (!) 
Exploiting Hashing Collisions 
Breaking “Trusted” PKI Standard
“SSL Authenticate-then-encrypt 
is Provably-Secure.” 
– Hugo Krawczyk 
17 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Promotion
Reality 
18 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
SSL & TLS standards 
2011 “BEAST exploits CBC IVs” 
2012 “CRIME exploits compression” 
2013 “LUCKY13 exploits decryption”
“AES 256-bit Is Safe Even For 
TOP-SECRET Information.” 
– U.S. Government 
19 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Promotion
Reality 
20 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
2011 - AES standard 
“AES Broken 5x Faster 
Than By Brute Force; 
Cause: Small Key Space.” 
– Andrey Bogdanov
Reality 
21 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
2012 - AES standard 
“OpenSSL Uses AES 
Tables For Speed, 
Leaking Many Key Bits” 
– Fraunhofer Research
“It Would Take Millions Of Years 
To Break Standard 
Encryption.” 
22 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Promotion
Reality 
23 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
2012 – RSA SecurID 
“It Takes 13 Minutes To Extract 
A Secret Key From AES-based 
RSA SecurID 800 Dongles” 
– INRIA
24 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
II. Discussion
The Myth of “Strong” Security 
There Is No Such A Thing Like: 
● “Strong Authentication” 
● “Strong Encryption” 
● “Strong Security” 
> Crypto Is Either SAFE or UNSAFE. 
25 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
Why Standards Fail? 
Encryption Keys Are Generated By: 
● PSEUDO-RANDOM Number Generators 
● OSes Do It Wrong (a recurring issue) 
● Developers Told To Trust OSes or CPUs. 
> Crypto Keys Are Known In Advance. 
26 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
Why Standards Fail? 
File Formats & Network Protocols Use: 
● “Magic Words” In File Headers, Protocols 
(“PDF%”, “%PNG”, “HTTP/1.1”, etc.) 
● Padding (often NULL bytes) 
> Leading To Known Plaintext Attacks. 
27 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
Why Standards Fail? 
AES(input, key) < 2256 (AES < Key Space) 
AES(iv, key) = System of Equations 
AES(in, key) = AES(AES(i(n-1), key), key) 
2 AES BLOCKS ENOUGH TO FIND KEY 
> ARITHMETIC, NOT “RANDOM” data. 
28 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
Why Standards Fail? 
Design: Standards Are Trying To Hide 
The Wood With 
A Single Tree: 
“Safe” KEY DATA 
29 | Copyright © 2013, TWD Industries AG. All rights reserved. 
YOUR 
DEAR 
TrustLeap
Claude Shannon's “Information Theory” 
Defined The Rules In The 1940s: 
1011011000010110111100101111 
0110110111010110010001111101 
1000100010100101001001010010 
1010010010100000101001111011 
1001111111010011111010101010 
1110101001011011111001101010 
1011000010010100011111111111 
1010010100101001010010010101 
0101100101001001010010010010 
1001001010010110100010101001 
0100101001010010010101010100 
“Safe” KEY DATA 
30 | Copyright © 2013, TWD Industries AG. All rights reserved. 
YOUR 
DEAR 
TrustLeap 
0111101 
0011001 
0101001 
010010 
1 
KEY 
LEAKS 
LEAKS 
I CAN SEE 
YOU!
What's The Problem? 
The “Information Theory” Says “Either 
Perfect Secrecy OR Convenience”: 
True Random Encryption Keys Applied 
On Data Larger Than The Key Leaks Key 
Patterns That Can Be Spotted & Used To 
Recover The “Secret” Key. 
31 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
Solutions? 
1 Use The One-Time Pad; Keys Must Be: 
(a) Random & Unique, 
(b) As Long As Data, 
(c) Safely Exchanged Before Encryption. 
Provably Safe If Safe Random Source & Key 
Exchange & No Key Reuse: Not Convenient. 
32 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
Solutions? 
2 Use A Very Strictly Defined Grammar 
(a) Does Not Suit All Uses 
(b) Requires High Crypto Skills 
(c) Any Usage Error Implies Failure. 
Can Be Made Provably Safe If Properly 
Done & Used, But Not General-Purpose. 
33 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
Solutions? 
3 Use Provably-Safe Mathematical Rules 
To Remove All Exploitable Key Leaks 
From Encryption Standard ciphertexts 
(making AES and others provably-safe). 
34 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Provably SAFE & CONVENIENT. 
Getting The Best Of Both World!
35 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
III. The Solution
TrustLeap 
Game-Changing: 
- Delivers Provably-Safe Certainty 
- Reduces Surface Of Vulnerability 
36 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
37 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Secure By-Design 
HOW: 
Mathematically-Proven: 
Its Design Does Not Expose 
Leaked Key Patterns In Encrypted Data.
38 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Secure Forever 
WHY: 
Without Correlations 
To Spot In Encrypted Data 
There Is Nothing To Target & Break.
39 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Ubiquity 
WHERE: 
A Low Overhead 
Makes It Suitable For All Uses 
(Servers, Phones, Embedded).
40 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Convenient 
WHY: 
Security Becomes Independent 
From Chosen Key Length And 
Involved Encryption Algorithm.
41 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Desirable Side Effects 
WHERE: 
By Restricting 
Access To Known Users 
It Excludes All External Threats, 
Reducing The Surface Of Vulnerability.
42 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
IV. Adoption
43 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Political Obstacles? 
Consensus Easy To Obtain: 
● Plug & Play, Securing AES, DES... 
● Visible Undisputable Benefits 
● 70-Year-Old Established Theory 
● Affordable Licensing Terms
44 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
V. Frequently 
Asked 
Questions
Quantum Computers 
Quantum Computers (used by the NSA since 
1990) find instantly results of algorithms without 
having to run them. This is the death of security 
based on computational hardness. 
Only Mathematically-Proven TrustLeap Encryption 
can resist to Quantum Computers (as there is 
nothing left to exploit) and can be said to be 
“provably unbreakable”. 
45 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
Quantum Encryption 
Quantum Encryption is based on PHYSICS rather 
than MATHS. Its security depends on the lack of 
KNOWN Principles of PHYSICS able to break it. 
This “security” will NEVER BE PROVEN: we learn 
more about PHYSICS every day. 
So, unlike Mathematically-Proven TrustLeap, 
Quantum Encryption can never be said to be 
“provably unbreakable”. 
46 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
Intrusion Detection Systems 
Application Firewalls and other security filters 
attempt to block abusers. 
They can only block AFTER an attack is detected, 
and their detection rules are updated AFTER a new 
attack signature is built and broadcasted. 
With TRUSTLEAP, only authenticated users can 
interact with your server applications: you know 
who to block, and where to find offenders. 
47 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
48 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
VI. Conclusions
Unbreakable Security 
● Future-Proof (I.e. QUANTUM Computers) 
● Mathematically Proven (Can Be Trusted By All) 
● Independent From Computing Power Used To Break It 
● No More Need To Enlarge Encryption Keys 
● No More Need To Change Encryption Algorithms 
● Also Unbreakable Two & Three-Factor Authentication 
● No Central Key Repository Needed (But Can Be Used) 
● Mobiles / Embedded: Very Low CPU / RAM Overhead 
49 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
The Value Of Trust 
Applications 
● Corporate Asset Protection (Patents, Talks, Databases) 
● Public Asset Protection (e-Votes, Medical Records, Legal) 
● International Negotiations (United Nations, Contracts) 
● Transaction / Archiving Certifications (Indisputable) 
● Defense (Impenetrable Communications, Drones, etc.) 
● Chips Would Be Ideally Used (Tampering, I.P. Protection) 
● Legitimacy to Impose A Licensing Monopole (Exclusivity) 
50 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
Trust Starts With Identity 
● Email (Data Protection, Negotiations, Board Talks) 
● Routers / Firewalls (How Safe Are Barriers If Broken?) 
● Transactions (Trading, Contracts, Non-Repudiation) 
● Storage (Confidentiality, Tamper-Proof, Full-Control) 
● Defence (Remote Presence / Control, Chain Of Orders) 
● I.P. Rights (What Worth Is A Proof That Can Be Spoofed?) 
● Legal (Customers / Lawyers / Regulators Security Chain) 
Availability: TrustLeap Multipass 
51 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap
52 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
VII. Questions? 
…
53 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
TrustLeap 
is the Security Division of 
TWD Industries AG 
a Swiss Company. 
twd-industries.com
54 | Copyright © 2013, TWD Industries AG. All rights reserved. 
TrustLeap 
Contact TrustLeap 
contact@trustleap.com 
1000100010100101001001010010 
1010010010100000101001111011 
1001111111010011111010101010 
1110101001011011111001101010 
1011000010010100011111111111 
1010010100101001010010010101 
0101100101001001010010010010 
1001001010010110100010101001 
0100101001010010010101010100
TrustLeap 
Worldwide Corporate HQ 
TrustLeap 
Paradiesli 17 
CH-8842 Unteriberg SZ 
Switzerland 
Phone +41 (0)55 414 20 93 
Fax +41 (0)55 414 20 67 
Email contact@trustleap.com 
www.trustleap.com 
About TrustLeap 
TrustLeap, the security division of TWD Industries AG, protects digital assets with cryptanalytically unbreakable technology 
(safe against unlimited computing power: it is proven mathematically that no key leaks can be exploited). The TrustLeap 
secure platform leverages enterprise, cloud, networking, digital media and financial services in global strategic markets. 
TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other. 
Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely 
market their digital assets. 
TrustLeap 
55 | Copyright © 2013, TWD Industries AG. All rights reserved.

More Related Content

What's hot

Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
David Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & RansomwareDavid Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & RansomwareCSNP
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Real-Time Innovations (RTI)
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 
The Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless FutureThe Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless FutureRuben Merre
 
The CDO Agenda - Data Security and Encryption
The CDO Agenda - Data Security and EncryptionThe CDO Agenda - Data Security and Encryption
The CDO Agenda - Data Security and EncryptionDATAVERSITY
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewPeter Waher
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleGuardicore
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014Sectricity
 
Fal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_finalFal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_finalBryan Fite
 
A 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCA 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCSlawomir Jasek
 
Netguard product brochure
Netguard product brochureNetguard product brochure
Netguard product brochurecmnewman78
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkJeff Squyres
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoTPriyanka Aash
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudAmazon Web Services
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)Lancope, Inc.
 
SecurEntry by PrehKeyTec
SecurEntry by PrehKeyTecSecurEntry by PrehKeyTec
SecurEntry by PrehKeyTeccshergi
 
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2Frank Lesniak
 

What's hot (20)

Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
David Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & RansomwareDavid Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & Ransomware
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
The Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless FutureThe Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless Future
 
The CDO Agenda - Data Security and Encryption
The CDO Agenda - Data Security and EncryptionThe CDO Agenda - Data Security and Encryption
The CDO Agenda - Data Security and Encryption
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
 
Fal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_finalFal conunite2019 complete_zero_trust_final
Fal conunite2019 complete_zero_trust_final
 
A 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCA 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFC
 
Netguard product brochure
Netguard product brochureNetguard product brochure
Netguard product brochure
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
 
Fortinet Broşür
Fortinet BroşürFortinet Broşür
Fortinet Broşür
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoT
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the Cloud
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
 
SecurEntry by PrehKeyTec
SecurEntry by PrehKeyTecSecurEntry by PrehKeyTec
SecurEntry by PrehKeyTec
 
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2
 

Viewers also liked

Innovación, personas y participación
Innovación, personas y participación Innovación, personas y participación
Innovación, personas y participación Consorciocie
 
SYG Consultores Servicios Castellano
SYG Consultores Servicios CastellanoSYG Consultores Servicios Castellano
SYG Consultores Servicios CastellanoSYG Consultores
 
Presentación Impress realizada por Silvia
Presentación Impress realizada por SilviaPresentación Impress realizada por Silvia
Presentación Impress realizada por Silviaraul andres
 
HIPOGLUCEMIANTES DE ORIGEN VEGETAL: Bauhinia megalandra
HIPOGLUCEMIANTES DE ORIGEN VEGETAL: Bauhinia megalandraHIPOGLUCEMIANTES DE ORIGEN VEGETAL: Bauhinia megalandra
HIPOGLUCEMIANTES DE ORIGEN VEGETAL: Bauhinia megalandraBQRazetti2014
 
Es quate sasons
Es quate sasonsEs quate sasons
Es quate sasonscompetic
 
Distributed feature selection for efficient
Distributed feature selection for efficientDistributed feature selection for efficient
Distributed feature selection for efficientNexgen Technology
 
Reporte del congreso de EU sobre Rápido y Furioso
Reporte del congreso de EU sobre Rápido y FuriosoReporte del congreso de EU sobre Rápido y Furioso
Reporte del congreso de EU sobre Rápido y Furiosotoliro
 
Raghav_CDM-Exp_4.5yrs
Raghav_CDM-Exp_4.5yrsRaghav_CDM-Exp_4.5yrs
Raghav_CDM-Exp_4.5yrsRaghavendra S
 
iPhy tools for collation and analysis of phylogenomic data. M Blaxter
iPhy tools for collation and analysis of phylogenomic data. M BlaxteriPhy tools for collation and analysis of phylogenomic data. M Blaxter
iPhy tools for collation and analysis of phylogenomic data. M BlaxterRoderic Page
 
Lny A Veces Tenemos Miedo
Lny A Veces Tenemos MiedoLny A Veces Tenemos Miedo
Lny A Veces Tenemos Miedolnyamuni2
 
Blood Health for carlo web res
Blood Health for carlo web resBlood Health for carlo web res
Blood Health for carlo web resCarlo Ammendolia
 

Viewers also liked (20)

Innovación, personas y participación
Innovación, personas y participación Innovación, personas y participación
Innovación, personas y participación
 
Como instalar aeroo en open erp 6
Como instalar aeroo en open erp 6Como instalar aeroo en open erp 6
Como instalar aeroo en open erp 6
 
SYG Consultores Servicios Castellano
SYG Consultores Servicios CastellanoSYG Consultores Servicios Castellano
SYG Consultores Servicios Castellano
 
Curso formador de formadores online
Curso formador de formadores onlineCurso formador de formadores online
Curso formador de formadores online
 
Presentación Impress realizada por Silvia
Presentación Impress realizada por SilviaPresentación Impress realizada por Silvia
Presentación Impress realizada por Silvia
 
HIPOGLUCEMIANTES DE ORIGEN VEGETAL: Bauhinia megalandra
HIPOGLUCEMIANTES DE ORIGEN VEGETAL: Bauhinia megalandraHIPOGLUCEMIANTES DE ORIGEN VEGETAL: Bauhinia megalandra
HIPOGLUCEMIANTES DE ORIGEN VEGETAL: Bauhinia megalandra
 
Pre dc-nes
Pre dc-nesPre dc-nes
Pre dc-nes
 
Es quate sasons
Es quate sasonsEs quate sasons
Es quate sasons
 
Distributed feature selection for efficient
Distributed feature selection for efficientDistributed feature selection for efficient
Distributed feature selection for efficient
 
Del CRM al Social CRM
Del CRM al Social CRMDel CRM al Social CRM
Del CRM al Social CRM
 
Reporte del congreso de EU sobre Rápido y Furioso
Reporte del congreso de EU sobre Rápido y FuriosoReporte del congreso de EU sobre Rápido y Furioso
Reporte del congreso de EU sobre Rápido y Furioso
 
Ar quente
Ar quenteAr quente
Ar quente
 
La impresora
La impresoraLa impresora
La impresora
 
Presentación IVC+R 2011
Presentación IVC+R 2011Presentación IVC+R 2011
Presentación IVC+R 2011
 
Raghav_CDM-Exp_4.5yrs
Raghav_CDM-Exp_4.5yrsRaghav_CDM-Exp_4.5yrs
Raghav_CDM-Exp_4.5yrs
 
iPhy tools for collation and analysis of phylogenomic data. M Blaxter
iPhy tools for collation and analysis of phylogenomic data. M BlaxteriPhy tools for collation and analysis of phylogenomic data. M Blaxter
iPhy tools for collation and analysis of phylogenomic data. M Blaxter
 
Lny A Veces Tenemos Miedo
Lny A Veces Tenemos MiedoLny A Veces Tenemos Miedo
Lny A Veces Tenemos Miedo
 
Blood Health for carlo web res
Blood Health for carlo web resBlood Health for carlo web res
Blood Health for carlo web res
 
1 exp idea
1 exp idea1 exp idea
1 exp idea
 
Rhizomatic Philosophy
Rhizomatic PhilosophyRhizomatic Philosophy
Rhizomatic Philosophy
 

Similar to Trustleap - Mathematically-Proven Unbreakable Security

CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)Michael DeLaGarza
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
deceptionGUARD by GrayMatter
deceptionGUARD by GrayMatterdeceptionGUARD by GrayMatter
deceptionGUARD by GrayMatterGrayMatter
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...IRJET Journal
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloudNicholas Chia
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
 
CipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
OpenValue Meetup 24-11-2020 - Stream Machine
OpenValue Meetup 24-11-2020 - Stream MachineOpenValue Meetup 24-11-2020 - Stream Machine
OpenValue Meetup 24-11-2020 - Stream MachineRobin Trietsch
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of SystemsJamal Jamali
 
CipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce ChatterCipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce ChatterCipherCloud
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels PresentationRichard Blech
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET Journal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 

Similar to Trustleap - Mathematically-Proven Unbreakable Security (20)

CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
deceptionGUARD by GrayMatter
deceptionGUARD by GrayMatterdeceptionGUARD by GrayMatter
deceptionGUARD by GrayMatter
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
CipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: Encryption
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
OpenValue Meetup 24-11-2020 - Stream Machine
OpenValue Meetup 24-11-2020 - Stream MachineOpenValue Meetup 24-11-2020 - Stream Machine
OpenValue Meetup 24-11-2020 - Stream Machine
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
CipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce ChatterCipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce Chatter
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels Presentation
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Trustleap - Mathematically-Proven Unbreakable Security

  • 1. TRUSTLEAP ® The Need For Certainty Mathematically-Proven Unbreakable Security www.trustleap.com
  • 2. This document is aimed at helping people to understand the TrustLeap technology. A cryptographic oracle (where users chose and submit the plaintext: an ASCII classic English book and a sentence that they type, an encryption key, the standard encryption algorithm to secure like AES or RC4, and get the ciphertext, with the sentence injected at a random position that they must guess to demonstrate that teir plaintext attack is successful) as well as further information regarding the internals of TWD Industries AG's technology are available under a proper NDA, to selected partners. 2 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 3. 3 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap I. Definition, Promotion, Reality
  • 4. The Oxford Dictionary Encryption: to convert (information or data) into a code, especially to prevent unauthorized access. Origin: 1950s (in the US), from English 'in' and Greek kruptos 'hidden'. 4 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 5. Promotion “no one ever lost money to an attack on a properly designed [standard] cryptosystem” – Peter Gutmann 5 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 6. Reality 6 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap 2007 – RC4 / WEP 802.11 wireless standard Used to Steal 45 millions of Credit-Card Numbers Legal Costs: $40,900,000
  • 7. Reality 7 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap 2010 – A5-1 / GSM Phones wireless standard Spy, Trace and Impersonate Billion of Mobile Phone Users. – Karsten Nohl
  • 8. Reality 8 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap 2011 – GPRS / Web - Mail wireless standard Spy, Trace and Impersonate Billion of Mobile Phone Users. – Karsten Nohl
  • 9. 9 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap 2013 – 3DES / SIM Card Javacard standard Steal data, Spy, Trace and Impersonate Billion of Mobile Phone Users. – Karsten Nohl Reality
  • 10. Reality 2013 – Design of $1.5 trillion F-35 10 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Stolen From ...Pentagon
  • 11. Reality 11 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap 2013 – 96-bit secret key RFID car transponder Steal VW, Audi, Bentley, Lamborghini & Porsche cars as Megamos Crypto is broken. – Flavio Garcia
  • 12. Reality 12 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap 2013 – Switzerland e-VOTE Forgery They know since 2002 what they do wrong... but 2012 audits still certify a flawed system. – advtools.com
  • 13. Standard Encryption Is Broken, Routinely. But Experts Keep Saying: “It's Very Safe” 13 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Reality
  • 14. “Cryptosystem failure is orders of magnitude below any other risk.” – Peter Gutmann 14 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Promotion
  • 15. Reality 15 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap 2012 – X.509 Certificates “the Flame malware has been signed by forged PKI certificates to appear as if it was produced by... Microsoft.”
  • 16. Reality 16 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap The FLAME Malware Active Since Year 2000 (!) Exploiting Hashing Collisions Breaking “Trusted” PKI Standard
  • 17. “SSL Authenticate-then-encrypt is Provably-Secure.” – Hugo Krawczyk 17 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Promotion
  • 18. Reality 18 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap SSL & TLS standards 2011 “BEAST exploits CBC IVs” 2012 “CRIME exploits compression” 2013 “LUCKY13 exploits decryption”
  • 19. “AES 256-bit Is Safe Even For TOP-SECRET Information.” – U.S. Government 19 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Promotion
  • 20. Reality 20 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap 2011 - AES standard “AES Broken 5x Faster Than By Brute Force; Cause: Small Key Space.” – Andrey Bogdanov
  • 21. Reality 21 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap 2012 - AES standard “OpenSSL Uses AES Tables For Speed, Leaking Many Key Bits” – Fraunhofer Research
  • 22. “It Would Take Millions Of Years To Break Standard Encryption.” 22 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Promotion
  • 23. Reality 23 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap 2012 – RSA SecurID “It Takes 13 Minutes To Extract A Secret Key From AES-based RSA SecurID 800 Dongles” – INRIA
  • 24. 24 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap II. Discussion
  • 25. The Myth of “Strong” Security There Is No Such A Thing Like: ● “Strong Authentication” ● “Strong Encryption” ● “Strong Security” > Crypto Is Either SAFE or UNSAFE. 25 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 26. Why Standards Fail? Encryption Keys Are Generated By: ● PSEUDO-RANDOM Number Generators ● OSes Do It Wrong (a recurring issue) ● Developers Told To Trust OSes or CPUs. > Crypto Keys Are Known In Advance. 26 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 27. Why Standards Fail? File Formats & Network Protocols Use: ● “Magic Words” In File Headers, Protocols (“PDF%”, “%PNG”, “HTTP/1.1”, etc.) ● Padding (often NULL bytes) > Leading To Known Plaintext Attacks. 27 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 28. Why Standards Fail? AES(input, key) < 2256 (AES < Key Space) AES(iv, key) = System of Equations AES(in, key) = AES(AES(i(n-1), key), key) 2 AES BLOCKS ENOUGH TO FIND KEY > ARITHMETIC, NOT “RANDOM” data. 28 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 29. Why Standards Fail? Design: Standards Are Trying To Hide The Wood With A Single Tree: “Safe” KEY DATA 29 | Copyright © 2013, TWD Industries AG. All rights reserved. YOUR DEAR TrustLeap
  • 30. Claude Shannon's “Information Theory” Defined The Rules In The 1940s: 1011011000010110111100101111 0110110111010110010001111101 1000100010100101001001010010 1010010010100000101001111011 1001111111010011111010101010 1110101001011011111001101010 1011000010010100011111111111 1010010100101001010010010101 0101100101001001010010010010 1001001010010110100010101001 0100101001010010010101010100 “Safe” KEY DATA 30 | Copyright © 2013, TWD Industries AG. All rights reserved. YOUR DEAR TrustLeap 0111101 0011001 0101001 010010 1 KEY LEAKS LEAKS I CAN SEE YOU!
  • 31. What's The Problem? The “Information Theory” Says “Either Perfect Secrecy OR Convenience”: True Random Encryption Keys Applied On Data Larger Than The Key Leaks Key Patterns That Can Be Spotted & Used To Recover The “Secret” Key. 31 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 32. Solutions? 1 Use The One-Time Pad; Keys Must Be: (a) Random & Unique, (b) As Long As Data, (c) Safely Exchanged Before Encryption. Provably Safe If Safe Random Source & Key Exchange & No Key Reuse: Not Convenient. 32 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 33. Solutions? 2 Use A Very Strictly Defined Grammar (a) Does Not Suit All Uses (b) Requires High Crypto Skills (c) Any Usage Error Implies Failure. Can Be Made Provably Safe If Properly Done & Used, But Not General-Purpose. 33 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 34. Solutions? 3 Use Provably-Safe Mathematical Rules To Remove All Exploitable Key Leaks From Encryption Standard ciphertexts (making AES and others provably-safe). 34 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Provably SAFE & CONVENIENT. Getting The Best Of Both World!
  • 35. 35 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap III. The Solution
  • 36. TrustLeap Game-Changing: - Delivers Provably-Safe Certainty - Reduces Surface Of Vulnerability 36 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 37. 37 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Secure By-Design HOW: Mathematically-Proven: Its Design Does Not Expose Leaked Key Patterns In Encrypted Data.
  • 38. 38 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Secure Forever WHY: Without Correlations To Spot In Encrypted Data There Is Nothing To Target & Break.
  • 39. 39 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Ubiquity WHERE: A Low Overhead Makes It Suitable For All Uses (Servers, Phones, Embedded).
  • 40. 40 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Convenient WHY: Security Becomes Independent From Chosen Key Length And Involved Encryption Algorithm.
  • 41. 41 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Desirable Side Effects WHERE: By Restricting Access To Known Users It Excludes All External Threats, Reducing The Surface Of Vulnerability.
  • 42. 42 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap IV. Adoption
  • 43. 43 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Political Obstacles? Consensus Easy To Obtain: ● Plug & Play, Securing AES, DES... ● Visible Undisputable Benefits ● 70-Year-Old Established Theory ● Affordable Licensing Terms
  • 44. 44 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap V. Frequently Asked Questions
  • 45. Quantum Computers Quantum Computers (used by the NSA since 1990) find instantly results of algorithms without having to run them. This is the death of security based on computational hardness. Only Mathematically-Proven TrustLeap Encryption can resist to Quantum Computers (as there is nothing left to exploit) and can be said to be “provably unbreakable”. 45 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 46. Quantum Encryption Quantum Encryption is based on PHYSICS rather than MATHS. Its security depends on the lack of KNOWN Principles of PHYSICS able to break it. This “security” will NEVER BE PROVEN: we learn more about PHYSICS every day. So, unlike Mathematically-Proven TrustLeap, Quantum Encryption can never be said to be “provably unbreakable”. 46 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 47. Intrusion Detection Systems Application Firewalls and other security filters attempt to block abusers. They can only block AFTER an attack is detected, and their detection rules are updated AFTER a new attack signature is built and broadcasted. With TRUSTLEAP, only authenticated users can interact with your server applications: you know who to block, and where to find offenders. 47 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 48. 48 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap VI. Conclusions
  • 49. Unbreakable Security ● Future-Proof (I.e. QUANTUM Computers) ● Mathematically Proven (Can Be Trusted By All) ● Independent From Computing Power Used To Break It ● No More Need To Enlarge Encryption Keys ● No More Need To Change Encryption Algorithms ● Also Unbreakable Two & Three-Factor Authentication ● No Central Key Repository Needed (But Can Be Used) ● Mobiles / Embedded: Very Low CPU / RAM Overhead 49 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 50. The Value Of Trust Applications ● Corporate Asset Protection (Patents, Talks, Databases) ● Public Asset Protection (e-Votes, Medical Records, Legal) ● International Negotiations (United Nations, Contracts) ● Transaction / Archiving Certifications (Indisputable) ● Defense (Impenetrable Communications, Drones, etc.) ● Chips Would Be Ideally Used (Tampering, I.P. Protection) ● Legitimacy to Impose A Licensing Monopole (Exclusivity) 50 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 51. Trust Starts With Identity ● Email (Data Protection, Negotiations, Board Talks) ● Routers / Firewalls (How Safe Are Barriers If Broken?) ● Transactions (Trading, Contracts, Non-Repudiation) ● Storage (Confidentiality, Tamper-Proof, Full-Control) ● Defence (Remote Presence / Control, Chain Of Orders) ● I.P. Rights (What Worth Is A Proof That Can Be Spoofed?) ● Legal (Customers / Lawyers / Regulators Security Chain) Availability: TrustLeap Multipass 51 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap
  • 52. 52 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap VII. Questions? …
  • 53. 53 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap TrustLeap is the Security Division of TWD Industries AG a Swiss Company. twd-industries.com
  • 54. 54 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Contact TrustLeap contact@trustleap.com 1000100010100101001001010010 1010010010100000101001111011 1001111111010011111010101010 1110101001011011111001101010 1011000010010100011111111111 1010010100101001010010010101 0101100101001001010010010010 1001001010010110100010101001 0100101001010010010101010100
  • 55. TrustLeap Worldwide Corporate HQ TrustLeap Paradiesli 17 CH-8842 Unteriberg SZ Switzerland Phone +41 (0)55 414 20 93 Fax +41 (0)55 414 20 67 Email contact@trustleap.com www.trustleap.com About TrustLeap TrustLeap, the security division of TWD Industries AG, protects digital assets with cryptanalytically unbreakable technology (safe against unlimited computing power: it is proven mathematically that no key leaks can be exploited). The TrustLeap secure platform leverages enterprise, cloud, networking, digital media and financial services in global strategic markets. TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other. Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely market their digital assets. TrustLeap 55 | Copyright © 2013, TWD Industries AG. All rights reserved.