KNB Secure Processor
In 2485 AT the Kokubusho recognised that IJN military communications in the field contained unacceptable vulnerabilities. Relying on signals broadcast through open, unsecured space to transmit tactical and strategic data leaves them vulnerable to interception, electronic warfare and even intrusion attempts. Although attacks such as this are not without their complications, they still pose an unacceptable threat to IJN operational capabilities and so a project was commissioned to reduce these vulnerabilities. Headed by Professor Kuroq nam-Byntach of the Empire of Nalydya, Dr Kenji Yamamoto of Ingen, PhD in Engineering Physics & Mechanics, and CIs Abtruse Cypher and Belated Revelation of the Gauss Dominion, the Gated Network project was launched in late Diamond, 2485 AT, at the Hama Institute of Technology on Laptev.
The KNB Secure Processor, KNB Conversion Kit and .knb filetype are currently available for development and manufacture in the Jade Empire of Ingen, the Gauss Dominion and the Empire of Nalydya.
The KNB Secure Processor, KNB Conversion Kit and .knb filetype are currently available for development and manufacture in the Jade Empire of Ingen, the Gauss Dominion and the Empire of Nalydya.
Technical Specifications
The KNB project initially aimed to developed a composite system composed of miniaturized, normalised FTL gates located in the communications centres of networked warships, allowing for immediate hard-wired access between ships. This, combined with a comprehensive filtering system backed by miniature physical transfer systems and a new filetype with associated software to process incoming sensor information, would render ships mounting the system practically impervious to remote intrusion attempts, although on its own the system did nothing to prevent electronic warfare methods such as jamming and false signal generation.
After development revealed that the Gate network required was not practically feasible, the second branch of the project was expanded. The resulting device, known as the KNB Secure Processor, is a composite device and software combination that can be mounted on any network device, provided the drivers and software are installed on the network itself.
Upon receipt of any signal or sensory input, the KNB Secure Processor captures it using optical data storage, wherein lasers are used to alter the fluorescent qualities of nanoscale crystals. This crystal is then detached from the receiver and the machine converts the data into a raw .knb filetype, an inert base code incapable of containing executables, macros, or other actionable data. The crystal is then physically transferred across a distance of 2 nanometres to connect to the ship's network KNB adapter. The .knb file is scanned for dangerous and unidentifiable elements and extrapolated in layers without ever being fully constituted. It is impossible to hide a function in a .knb file as all elements, commands and structures must be visibly defined for it to be reconstituted into another filetype. Any hidden elements that are not caught by the initial conversion are by default not written in to the .knb file and so cannot be reconstituted.
Each KNB Secure Processor contains hundreds of crystals, allowing for an effectively uninterrupted flow of data. The processor contains sufficient memory and computational resources to support itself, but upgrades to central ship systems are necessary to allow them to monitor their KNB Secure Processors and adjust to the extra physical layer present in their networks. A KNB Secure Processor is approximately thirty centmeters cubed.
After development revealed that the Gate network required was not practically feasible, the second branch of the project was expanded. The resulting device, known as the KNB Secure Processor, is a composite device and software combination that can be mounted on any network device, provided the drivers and software are installed on the network itself.
Upon receipt of any signal or sensory input, the KNB Secure Processor captures it using optical data storage, wherein lasers are used to alter the fluorescent qualities of nanoscale crystals. This crystal is then detached from the receiver and the machine converts the data into a raw .knb filetype, an inert base code incapable of containing executables, macros, or other actionable data. The crystal is then physically transferred across a distance of 2 nanometres to connect to the ship's network KNB adapter. The .knb file is scanned for dangerous and unidentifiable elements and extrapolated in layers without ever being fully constituted. It is impossible to hide a function in a .knb file as all elements, commands and structures must be visibly defined for it to be reconstituted into another filetype. Any hidden elements that are not caught by the initial conversion are by default not written in to the .knb file and so cannot be reconstituted.
Each KNB Secure Processor contains hundreds of crystals, allowing for an effectively uninterrupted flow of data. The processor contains sufficient memory and computational resources to support itself, but upgrades to central ship systems are necessary to allow them to monitor their KNB Secure Processors and adjust to the extra physical layer present in their networks. A KNB Secure Processor is approximately thirty centmeters cubed.
Development
PHASE ONE
Phase One consisted of the development and construction of the physical hardware required for the K-nB Gated Network. Of primary concern was cabling. The design of the K-nB Gated Network meant that engineers could take advantage of the superior speeds and signal quality offered by physical connections, and multi-fiber optical fiber cables were decided upon as the ideal balance between economy and performance.
The mostchallenging aspect of Phase One proved to be the miniaturisation of the Gates themselves. Professor nam-Byntach, a specialist in miniaturisation whose expertise proved crucial during Project Mercy, spent considerable time and energy in developing miniaturised TILT portal generators whose components could withstand the immense pressures and power throughput necessary to open an FTL portal. Unfortunately, following extensive testing it was determined that gates could not be built of a sufficiently reduced size to serve any practical purpose.
PHASE TWO
Phase Two turned its attention to the KNB Secure Processor device. After Dr Yamamoto introduced the concept of optical data storage and a rotating system of multiple storage crystals, Professor nam-Byntach was able to successfully miniaturise the technology, creating a powerful and compact processor able to handle in excess of a petabyte per second in terms of conversion and physical data transfer. However, testing revealed that the final stage, during which the .knb files were scanned and analysed for security threats and then reconstituted, was causing unacceptable delays in data transmission through the test networks.
PHASE THREE
Phase Three saw the project team reach out to the Gauss Dominion for assistance in refining the conversion software. Two CI personnel, Abtruse Cypher and Belated Revelation, were assigned to the project. After initial analysis of the hardware and requirements, they created a digital sandbox environment and ran a series of exponentially diverse theoretical simulations in an attempt to ascertain the most efficient code. Phase Three took just in excess of thirty-one hours, after which the duo delivered an updated software release which they were confident would provide the best performance based on the available hardware and architecture.
When field-tested, the KNB Conversion Kit Version 15061.004 proved to have reduced the duration of the process by a factor of over 8,000 from Version 18.2, streamlining the process and creating a viable real-time security tool. When debriefed, Belated Revelation explained that they appreciated the humour in having found the ideal version only three hours in, but that they had continued in the interests of stringency to ensure that no other options could offer superior performance.
Phase One consisted of the development and construction of the physical hardware required for the K-nB Gated Network. Of primary concern was cabling. The design of the K-nB Gated Network meant that engineers could take advantage of the superior speeds and signal quality offered by physical connections, and multi-fiber optical fiber cables were decided upon as the ideal balance between economy and performance.
The mostchallenging aspect of Phase One proved to be the miniaturisation of the Gates themselves. Professor nam-Byntach, a specialist in miniaturisation whose expertise proved crucial during Project Mercy, spent considerable time and energy in developing miniaturised TILT portal generators whose components could withstand the immense pressures and power throughput necessary to open an FTL portal. Unfortunately, following extensive testing it was determined that gates could not be built of a sufficiently reduced size to serve any practical purpose.
PHASE TWO
Phase Two turned its attention to the KNB Secure Processor device. After Dr Yamamoto introduced the concept of optical data storage and a rotating system of multiple storage crystals, Professor nam-Byntach was able to successfully miniaturise the technology, creating a powerful and compact processor able to handle in excess of a petabyte per second in terms of conversion and physical data transfer. However, testing revealed that the final stage, during which the .knb files were scanned and analysed for security threats and then reconstituted, was causing unacceptable delays in data transmission through the test networks.
PHASE THREE
Phase Three saw the project team reach out to the Gauss Dominion for assistance in refining the conversion software. Two CI personnel, Abtruse Cypher and Belated Revelation, were assigned to the project. After initial analysis of the hardware and requirements, they created a digital sandbox environment and ran a series of exponentially diverse theoretical simulations in an attempt to ascertain the most efficient code. Phase Three took just in excess of thirty-one hours, after which the duo delivered an updated software release which they were confident would provide the best performance based on the available hardware and architecture.
When field-tested, the KNB Conversion Kit Version 15061.004 proved to have reduced the duration of the process by a factor of over 8,000 from Version 18.2, streamlining the process and creating a viable real-time security tool. When debriefed, Belated Revelation explained that they appreciated the humour in having found the ideal version only three hours in, but that they had continued in the interests of stringency to ensure that no other options could offer superior performance.