Two U. S. Air Force F-22 Raptor stealth jet fighters fly near Andersen Air Force Base in this handout photo dated August 4, 2010. (REUTERS/U.s. Air Force/Master Sgt. Kevin J. Gruenwald/Hand-out)
The air force is working with the industry for the testing of an emerging cybersecurity technology that has not yet been “hacked” despite the vast amounts of tried to make.
The software, created by Merlin Cyrption, is designed to defeat sophisticated AI and Quantum computing hacking techniques by “never repeat a pattern,” developers say.
Engineers of the new product on to explain that AI and Quantum computing are able to crack sophisticated encryption through the recognition of patterns and the analysis of mathematical sequences.
“This encryption is non-deterministic and never repeats patterns. This cannot be broken by means of statistical analysis. It is not based on mathematics. All encryption algorithms are based on mathematics, and this is not,” Brandon Brown, Merlin Cyrption CEO told Warrior Maven in an interview.
While Brown is careful to avoid the term “non-hacked,” she does say that the technique has so far not been penetrated by some of the most advanced hacking techniques that are available today.
“There is a lot of testing and it is not hacked,” she said. “Which input you put in, you get a different output.”
Together with the air force, the software has been tested by the Louisiana-based Cyber Innovation Center and the Univ. of Louisiana.
Brown is naturally reluctant to give many of the details of this new method for their own reasons, but she did offer a broad overview of how the technology works.
“It makes use of a random data generator that never repeats a pattern. This puts it in a good position to overcome AI and Quantum computing,” Brown added.
The new software has yet to be formally used by the US army, but has already been applied in the private sector.
Merlin Cyrption technology bears some resemblance, at least in concept and application, to another “yet-to-be-hacked” computer network with the name STTarxx.
While it is still developing the technology in order to more fully applicable to large networks, engineers are working on STTarxx say they have a operational “closed network” impervious to attempted enemy invaders.
In a way that is both different and somewhat analogous to methods used by Merlin Cyrption, STTarxx makes use of “random” encryption is designed to be “untrackable” by even the most advanced algorithms.
“If you set up a network from computer to computer and you will find a STTarxx network, we take over the internet and you can’t do anything else, but on that network. It is a closed network,” Phil Gambell, Chief Business Development Officer, STT, told Warrior Maven in an interview.
A part of how STTarxx wants to remain un-detectable by sending a message to potential intruders with the writing of “you are not authorized” to access. It is not intended to confirm that the network of the existence of hackers.
“You can communicate on the network, but you can’t be tracked. If someone tries to hack us, we do not send a message appears that say ” you are not authorized to perform. We are like a dark spot,” Gambell added.
An industry cybersecurity expert called the new technology “what has the government looking for… a single solution for the protection of digital assets,” yet emphasized that the new tech may encounter challenges when it comes to the implementation.
“The challenge of this approach is that it is a threat to other technologies and investments in a lesser state solutions. Especially when the defense and infrastructure programs, such as nuclear power plants and power grids have invested heavily in the patch -work of their networks and systems,” Jerry Torres, CEO of Torres Advanced Enterprise Solutions, a private firm that the cyber forensics training to US and friendly foreign governments.
Although the Air Force does not often comment in detail on these types of technologies as they are revised, the service is making a decided effort to improve the security on their networks. As part of this effort, they also had some success in the prevention of “hacking.”
Last year, the air force conducted a “Hack the Air Force” event, where they encouraged the best and the brightest private sector hackers to try penetrating their networks.
The event, called HackerOne, brought some of the world’s elite hackers at the event. Air Force reports are saying that they were happy that their sites are not easy to crack. Hackers looked for bugs and vulnerabilities, and found a number, only then to learn they are already patched or addressed.
“They (the hackers) were under the impression,” the Lt. Col. Jonathan Joshua 24 AF Deputy Chief of Staff, said in a written Air Force report. “If a vulnerability was identified, shortly after that, hackers would attempt to emphasize that the vulnerability for another team of hackers…but the vulnerability has already been restored.”
The air force has, for quite some time, is aggressive in the pursuit of cybersecurity, given the threat of this environment. The service has adopted a number of new Cyber Squadron units that are charged with the education improved cyber hygiene for the safety and the grinding of a service-wide attention to cybersecurity. Also the service is looking to some of the advanced cyber defense methods that use automation to the replication of the human behavior of users online. This is done for the specific purpose of attracting, and then follow, hackers, intruders and enemies.
Also, stay on the height of a coming Warrior Maven report on the Air Force’s emerging Cyber Resilience of Arms office System, a certain high-tech effort now underway to cyber hardening weapons systems and data networks.
More Weapons and Technology – WARRIOR MAVEN (CLICK HERE)–