STRATEGIC ENCRYPTION www.crypto-logica.com.

Slides:



Advertisements
Similar presentations
STRATEGIC ENCRYPTION
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
STRATEGIC ENCRYPTION 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Lecture 23 Symmetric Encryption
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
STRATEGIC ENCRYPTION 2. SECURITY Future proof – available today Absolute technical security Secure against computing developments.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Block ciphers Structure of a multiround block cipher
STRATEGIC ENCRYPTION 2. SECURITY Future proof – available today Absolute technical security Secure against computing developments.
Lecture 23 Symmetric Encryption
STRATEGIC ENCRYPTION 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY.
Chapter 2 Symmetric Encryption.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Attacks on Public Key Encryption Algorithms
Symmetric Cryptography
Provides Confidentiality
Chapter3: Block Ciphers and the Data Encryption Standard
Triple DES.
School of Computer Science and Engineering Pusan National University
6b. Practical Constructions of Symmetric-Key Primitives.
Outline Desirable characteristics of ciphers Uses of cryptography
Basic Network Encryption
Outline Desirable characteristics of ciphers Uses of cryptography
Cryptography after DES
Symmetric Key Block Ciphers
Cryptography Lecture 12.
Cryptography Basics and Symmetric Cryptography
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
AES Objectives ❏ To review a short history of AES
Security through Encryption
Security in Network Communications
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
Block vs Stream Ciphers
SOFTWARE IMPLEMENTATION OF OCB MODE
Block Ciphers (Crypto 2)
Basic Network Encryption
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Introduction to Cryptography
Cryptography Lecture 11.
Cryptography Lecture 17.
July 15, 2019 doc.: IEEE r0 May, 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES.
Information and Computer Security CPIS 312 Lab 4 & 5
Counter With Cipher Block Chaining-MAC
Counter Mode, Output Feedback Mode
Stream Cipher Structure
Feistel Cipher Structure
Presentation transcript:

STRATEGIC ENCRYPTION www.crypto-logica.com

2. SECURITY PROBLEMS & SOLUTION Features of Crypto-Logica Key Exchange, Encryption and Hash Future proof due to both ultimate security and ultimate speed Unlimited key length (chosen by hardware/software embodiment) Unlimited hash length (chosen by hardware/software embodiment) Provable security against both quantum and classic computers Brutal force security due to longer keys Linear cryptanalysis security due to non-polynomial key finding Differential cryptanalysis security without weak keys Provable security of key exchange due to symmetric algorithms Provable security of data encryption due to symmetric algorithms Provable security of authentication due to symmetric algorithms

3. METHOD PROBLEMS & SOLUTION Features of Crypto-Logica Key Exchange, Encryption and Hash No complex operations for simple hardware/software embodiment No matrix operations for simple hardware/software embodiment No vector operations for simple hardware/software embodiment No substitution (S) boxes for preventing side-channel attack Simple non-linear arithmetic for simple embodiments Simple design without a “trap door” preventing key finding Family of algorithms for further development and customization Optional unpublished algorithms for maximum top security Customizable algorithms for government security User adjustable parameters for mission-critical security

4. TECHNICAL PROBLEMS & SOLUTION Features of Crypto-Logica Key Exchange, Encryption and Hash Highest encryption speed (several Gbit/s) on a single CPU thread Highest hashing speed (several Gbit/s) on a single CPU thread Ultralow latency for easy plug-in into current and new designs Small processing complexity for any hardware platform Small memory size for immediate applications anywhere Small memory bandwidth preventing memory bus bottleneck Low power consumption for portable and unattended devices Low heat dissipation for stealth and undercover operations Small weight of platform hardware for portable and aerial devices Small size of platform hardware for small devices

5. PRACTICAL PROBLEMS & SOLUTION Features of Crypto-Logica Key Exchange, Encryption and Hash Low cost platform hardware for massive deployment Low cost platform software for massive deployment Runs on any platform for installation on already deployed assets Simple and fast interfacing with top level applications Huge bit confusion by stream and block ciphers Huge bit diffusion by block ciphers Almost perfect randomness by stream and block ciphers Integer arithmetic running on any platform No multiplication for fast execution on general purpose processors No division for fast execution on general purpose processors

6. CRYPTO-LOGICA SOLUTIONS Crypto-Logica Team developed its own key exchange, symmetric key encryption and hash authentication

7. CRYPTO-LOGICA METHODS TYPE ENCRYPTION METHOD KEY LENGTH [bits] BLOCK [bits] SHORT LONG MIN MAX Stream CLIS Ideal Stream (4) 256 4096 ∞ CLOS Occult Stream 128 CLAS Advanced Stream 512 CLUS Ultimate Stream 384 CLES Extreme Stream 768 Block CLOB Occult Block CLAB Advanced Block CLUB Ultimate Block CLEB Extreme Block

8. SPEED @ SINGLE THREAD i7 2.2GHz Y P E NATIVE CL ALGORITHM VS AES CTR OPTIMIZED KEY LENGTH [bits] BLOCK SIZE ENC/DEC SPEED [Gbit/s] CL SPEED AES SPEED B AES CTR 256 128 1,401 1 S CLIS 4096 ∞ 6,752 4,819 CLOS 5,308 3,789 CLAS 6,663 4,756 CLUS 6,834 4,878 CLES 4,544 3,243 CLOB 5,263 3,757 CLAB 6,799 4,853 CLUB 6,594 4,707 CLEB 4,640 3,312

9. USER ADJUSTABLE PARAMETERS Crypto-Logica solutions User parameters Size [bits] Hybrid stream ciphers Key length 256..4,294,967,296 Hybrid block ciphers Hash signature 4 simple stream methods Hash length 256..65,536 4 hybrid stream methods Stream offset 8, 16, 32 or 64 4 hybrid block methods Stream sum 8 hybrid hash methods Stream counter Zero encryption overhead Stream increment Identical ciphertext and plaintext bitrate Block offset Identical ciphertext and plaintext file size Block rounds Encryption speed almost independent on key length Block counter Hash speed almost independent on signature Block Increment

10. NIST STS 2.1 RANDOMNESS TESTS CRYPTO-LOGICA methods passed all NIST STS 2.1 tests, determining whether or not the sequence can be considered random, while being many times faster than AES. For example: CRYPTO-LOGICA methods solved all security, method, technical and practical problems in key exchange, symmetric key encryption and hash authentication, both now and in the future!