Cyber Thread

New and old developments in aviation technology.
  • Author
  • Message
Offline
User avatar

popcorn

Elite 3K

Elite 3K

  • Posts: 6669
  • Joined: 24 Sep 2008, 08:55

Unread post11 Jul 2017, 23:30

Given it's impact on warfighting and the battlespace I've created this thread for news and discussions on developments in the Cyber world.

https://defensesystems.com/articles/201 ... ption.aspx

Industry firm patents new cyber encryption technology

A private sector firm is offering a new kind of reinforced encryption technology for the U.S. military services to safeguard mobile phone, radio and computer transactions from brute force cyberattacks.

The Internet Promise Group has used internal funding to patent a new technical method of securing encrypted military communications by implementing, integrating and changing random bits with an existing encryption key algorithm.

The idea is to strengthen existing encryption keys to make them less vulnerable to brute force attacks where adversaries or cyber intruders use computer algorithms to try multiple combinations of keys until the details are discovered and the key is broken, said Tara Chand, founder and CEO of Internet Promise Group...

“We want to figure out a way to make the key so strong that you cannot break it,” he said.

Chand explained that his firm has patented Random Dance Keys, a new class of military encryption technology engineered to be impenetrable to brute force cyberattacks.
"When a fifth-generation fighter meets a fourth-generation fighter—the [latter] dies,”
CSAF Gen. Mark Welsh
Offline
User avatar

rheonomic

Active Member

Active Member

  • Posts: 240
  • Joined: 30 Apr 2015, 03:44
  • Location: US

Unread post12 Jul 2017, 00:33

A private sector firm is offering a new kind of reinforced encryption technology for the U.S. military services to safeguard mobile phone, radio and computer transactions from brute force cyberattacks.

...

The idea is to strengthen existing encryption keys to make them less vulnerable to brute force attacks where adversaries or cyber intruders use computer algorithms to try multiple combinations of keys until the details are discovered and the key is broken, said Tara Chand, founder and CEO of Internet Promise Group...


I'm glad someone lives in a magical world where brute-force attacks on cryptosystems are the most important security problem and endpoint security is a solved problem. :roll:
u = (CB)⁻¹(cvdt_des - CAx)
Offline
User avatar

popcorn

Elite 3K

Elite 3K

  • Posts: 6669
  • Joined: 24 Sep 2008, 08:55

Unread post16 Jul 2017, 23:26

Setting the Cyber folks free to chart their own course and pursue a more offensive posture.

https://apnews.com/23fdab1570ae4846ae4d ... _medium=AP

Military cyber operations headed for revamp after long delay

WASHINGTON (AP) — After months of delay, the Trump administration is finalizing plans to revamp the nation’s military command for defensive and offensive cyber operations in hopes of intensifying America’s ability to wage cyberwar against the Islamic State group and other foes, according to U.S. officials.

Under the plans, U.S. Cyber Command would eventually be split off from the intelligence-focused National Security Agency.

Details are still being worked out, but officials say they expect a decision and announcement in the coming weeks. The officials weren’t authorized to speak publicly on the matter so requested anonymity.

The goal, they said, is to give U.S. Cyber Command more autonomy, freeing it from any constraints that stem from working alongside the NSA, which is responsible for monitoring and collecting telephone, internet and other intelligence data from around the world — a responsibility that can sometimes clash with military operations against enemy forces.

Making cyber an independent military command will put the fight in digital space on the same footing as more traditional realms of battle on land, in the air, at sea and in space. The move reflects the escalating threat of cyberattacks and intrusions from other nation states, terrorist groups and hackers, and comes as the U.S. faces ever-widening fears about Russian hacking following Moscow’s efforts to meddle in the 2016 American election.

The U.S. has long operated quietly in cyberspace, using it to collect information, disrupt enemy networks and aid conventional military missions. But as other nations and foes expand their use of cyberspying and attacks, the U.S. is determined to improve its ability to incorporate cyber operations into its everyday warfighting... He added, however, that over time, the U.S. has increasingly used cyber as a tactical weapon, bolstering the argument for separating it from the NSA.
"When a fifth-generation fighter meets a fourth-generation fighter—the [latter] dies,”
CSAF Gen. Mark Welsh

Return to Technology

Who is online

Users browsing this forum: wrightwing and 5 guests