Rune – Does Your Data Have Superpowers?
Dec 14, 2014
Rune – Does Your Data Have Superpowers?
Information Security Is Compromised – We need a hero
Read the news everyday:Easily identify passwords through brute force
24 seconds to break a NTLM login password http://
www.zdnet.com/blog/hardware/cheap-gpus-are-rendering-strong-passwords-useless/13125
World’s first commercial quantum computer Rapidly compromises all PKI based internet transactions http://venturebeat.com/2011/05/27/first-quantum-computer-sold/
RSA – Secure ID compromised Math-based token encryption compromised http://www.pcworld.com/businesscenter/article/229553/after_hack_rsa_offer
s_to_replace_secureid_tokens.html
Citi massive credit cards breached for the 2nd time http://www.wired.com/threatlevel/2011/06/citibank-hacked/
LulzSec New kind of hacking group that is exposing vulnerabilities http://www.guardian.co.uk/technology/2011/jun/14/us-politics-hacking-senat
e-lulzsec
Why is the Vema-Cipher Platform Different?
Data-centric Encrypted information easily moves across any
infrastructure even public internet
Can be used in combination with math-based solutions like RSA SecureID®
Second tier of encryption in the event RSA or other math-based cipher ‘seed values’ are compromised
Two encryption modes: Variable-Strength Free math based cipher: Standards based PKI and AES Keys Paid Vernam cipher: VC-Pad™
First Vernam Encryption Product of it’s kind A One-time pad ‘wrapped’ in a standards based AES 256
encryption The VC-Pad™ is an encryption key based on random
numbers that are not mathematically derived
The Vema-Cipher Value: Unconditional Security
Encryption for those that need security in addition to compliance
Personal information Business intelligence Proprietary information
Secures your data locally or in the cloud No matter where data is stored… You control exactly who
can read your message
Defends your data as it moves though hostile environmentsInnovative yet proven approach to data security
Standards based compliance coupled with unbreakable encryption
ComplianceFIPS 140-2
SecureVernam Cipher
Simple to Use
3 Easy Steps
• Secure:• Proven, unbreakable
Vernam cipher• VC-Key™ creates a
completely random message – immune to brute-force attacks
• Stops man-in-the-middle attacks
• Compliance:• FIPS 140-2 standards-
based encryption
• Simple to use: 3 steps• Set your audience• Select your message or
document• Click to encrypt or
decrypt
Historical “Vernam” issues addressed
Utilizes modern dense storage devices Addresses requirement for 1 to 1 VC-Pad™ to data ratio
Random number generators are readily available No longer difficult to generate Proven TRNG products from Comscire, ID Quantique e.g. Pass NIST’s die hard test for cryptographically secure random
numbers
Multiple methods for VC-Pad™ exchange Physical – For enhanced security policies Electronic – Much more secure than current, standard PKI solutions
VC-Pad™ can be physically secured VC-Pad™ can be on external hard drives with strong defense
mechanisms (Biometric, GPS, e.g.)
VC-Pad™ are not reused Tracks where you are at in the VC-Pad™ random mass Delete when it makes sense – Doesn’t affect integrity of cipher-text
Rune Delivers
Veri-Cipher Platform Open source, standards-based crypto engine Supports Vernam encryption Integrate into many different applications
Deadbolt Application to secure your data
Locksmith Made up of Agent(s) and Vault(s) System to make “Vernam” VC-Pad™ System to manage standards based keys and VC-Pad™
3 clicks or lessVernam and standards-based encryptionEasy key and VC-Pad™ managementOnly deploy to those that need to knowMinimal to no IT department overheadRune can manufacture VC-Pad™ or customers can purchase Locksmith & Vault appliancesto manufacture freely
Deadbolt Application: How it Works
Simple floating tool-barEasily set your target audience: 1 person or many
Select text or file and click 1 button to encryptEncrypted text or file is created
The encrypted file is ready to send or store
Locksmith System made up of Agents and a VaultCollects random numbersCreates VC-Pads™ for unbreakable encryptionProduces VC-Pad™ on USB devices or optical storageIntegrates automatically with VaultUse one or many to speed up production times
Maintain control of systemCreates an escrow of asymmetric keys and symmetric VC-Pad™Standards based approach (OASIS)Manage users, groups, permissions, keys & VC-Pads™ that are deployedAdd users to groupsEasily re-key devices for data retrieval
Software Packages
Deadbolt LT is a free open-source version of the software that provides asymmetric encryption onlyDeadbolt can be purchased as a stand-alone product for personal use
Rune manufactures VC-Pads™ Can use stronger symmetric encryption for personal
archival or small group communications
Locksmith Systems are sold in various packages for larger group communications
Includes Deadbolt, Agent(s) and Vault(s) Allow users to manufacture own VC-Pads™
Locksmith Systems
Locksmith UP (Ultra Portable) All systems in highly portable laptop form factor – Supports
up to 50 users – Custom solutions available
Locksmith 100 2 Agents, 1 Vault 100, 100 USB Tokens, Supports 100 Users
Locksmith 250 5 Agents, 1 Vault 250, 250 USB Tokens, Supports 250 Users
Locksmith 500 10 Agents, 1 Vault 500, 500 USB Tokens, Supports 500
Users
Larger than 500 please discuss solution with your sales representative
Rune = Unconditional Security
Executive teams communicate with confidence in open SharePoint platformsFinance teams collaborate effectively and inside-information leaks are preventedFinancial institutions securely transmit sensitive informationLegal teams communicate securely with clientsM&A teams negotiate deals in total privacy R&D teams out-perform competitors by protecting critical IPGovernment & Military teams keep operational directives secure
Contact Us
Rune Information Security Company Pte Ltd1 Raffles PlaceOne Raffles PlaceLevel 24-00Singapore 048616PH: +65 6408-0575Email: [email protected]: www.rune.sg