Let’s Rethink Crypto Dr. Ken Dick

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Security By Design Scott A. Vanstone V.P. Cryptographic Research Research in Motion Distinguished Professor Emeritus University of Waterloo.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Network Security Confidentiality Using Symmetric Encryption Chapter 7.
Message Authentication Code
Public Key Cryptography
Web Applications Security Cryptography 1
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Attacks on Public Key Encryption Algorithms
Symmetric Cryptography
Cryptography Why Cryptography Symmetric Encryption
PowerPoint® Slides to Accompany
Public Key Encryption Systems
e-Health Platform End 2 End encryption
PowerPoint® Slides to Accompany
PPP – Point to Point Protocol
Outline Desirable characteristics of ciphers Uses of cryptography
Big Numbers: Mathematics and Internet Commerce
Basic Network Encryption
Cryptography.
Networks Encryption.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Lesson 4-5 AP Computer Science Principles
Outline Desirable characteristics of ciphers Uses of cryptography
IS3230 Access Security Unit 9 PKI and Encryption
Lecture 3: Symmetric Key Encryption
Digital Signatures Last Updated: Oct 14, 2017.
Lesson 5: Simple Encryption
Public-Key Cryptography
Computer Simulation of Networks
Cryptography Basics and Symmetric Cryptography
Survey of Crypto CoProcessor Design
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
Cryptography and Network Security Chapter 3
PowerPoint® Slides to Accompany
Quantum Cryptography Alok.T.J EC 11.
Security through Encryption
PART VII Security.
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Introduction to Symmetric-key and Public-key Cryptography
Encryption NSA – used to be able to crack most codes, technology has changed that. Now other methods are applied by NSA to access transmissions (see 2013.
Security.
Security Of Wireless Sensor Networks
Cryptography and Network Security
Appendix 5: Cryptography p
NET 311 Information Security
Lesson 7: Simple Encryption
Mobile Phone Technology
Cryptography Lecture 5.
Security of Wireless Sensor Networks
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
Slide design: Dr. Mark L. Hornick
Basic Network Encryption
Basic of Modern Cryptography
Public Key Encryption Systems
SPIRAL: Security Protocols for Cerberus
Security in Wide Area Networks
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Let’s Rethink Crypto Dr. Ken Dick 1. Sand ½ vs universe. Ken to send KW text – KW to create serious grpahic. 2. Stratcom – longer battery life, lighter load, perhaps on Slide 3. Legacy Systems – Agility, small footprint 4. Stratcom – backgound, why it was invented - came from military

Why Should We Care? Protects personal information. Protects financial information. Protects work information. Protects national information. … you get the idea, crypto is important to all of us.

Current State of Affairs Basis dates back to Claude Shannon’s "A Mathematical Theory of Communication” published in 1948 “It takes a secret to keep a secret” Crypto based on number theory. As compute power has grown, the complexity of cryptography & the key size has grown.

For example AES https://www.youtube.com/watch?v=mlzxpkdXP58 Beginning - key coming in and going through 10 cycles. Loop Ken – I didn’t find the exact clip you wanted that would be short enough to embed. See if you can located the 40 seconds that makes the most sense. But the gentleman’s pace of presentation may make it too difficult to embed and have people follow. https://www.youtube.com/watch?v=mlzxpkdXP58

This Increase Comes At A Cost Greater processor power is needed. Greater time is needed. The result, crypto has become an inflexible, monolithic algorithm. & Oh by the way it has been back-doored by the NSA.

The Goal The goal is obfuscation, the tool is cryptography. What if we focused more on the goal & came up with a different approach to cryptography?

A New Approach In this digital age: What if we based on crypto on coding theory? What if we could build it such that it is flexible & scalable? What if we could apply it at the packet level, instead of the message level? What if we could create a search space large enough that the probability of exhausting it is extremely small?

A New Approach AgilePQ: Next Generation Cryptography A series of encryption like algorithms that highly randomizes and scrambles data streams This allows for custom layering dependent upon the security needs of the customer Multiple libraries of tables This facilitates the changing of the key at multiple levels Cycled with each frame, packet, or message This further obfuscates the data One pass cycle means CPU is more efficient As opposed to multiple loops as is the mode in current standards. Value A masking algorithm is applied to flatten the distribution which prevents frequency analysis, a fundamental decode practice Less Battery / Lighter Lode

A New Approach Earth 10506 1077

Validation Points Algorithms: Red Teams “No known attack” Dr. Russell Impagliazzo UCSD Red Teams UNO, UNSW, & Third Party Patents Reviewed by Leading Cryptographer “Appears to be post quantum” Global Network and Lab Validation Completed: Innovation Lab Demonstrated Functionality & Security Demonstrated Improved DCM Performance vs. AES256 University of New South Wales (World Leader for Red-Team Attack Competitions) – Inserted 32 million packets with no collisions AgilePQ Architecture and Integration Document reviewed and approved by Advanced Services Labs Additional Validation: UCSD Cryptography Professors Evaluated for Mathematical Proof: “No Known Attack Surface” University of Nebraska-Omaha Cryptography; Three Years of Red Team Assaults – No Breaks Ponemon Institute; Nuclear Physicist Red Team Assault – No Breaks Keysight SystemVue Simulation; 2.25x Increase of throughput vs. LTE

DCM can beat accelerated AES Measurements AES 256 DCM Take-Away AES H/W Accelerated 891Mbps 928Mbps DCM can beat accelerated AES 4351 + Blade Router Test 75Mbps 196Mbps DCM almost line- rate Application to Application 1176ms 96ms DCM >12x faster IoT AES128:4329ms DCM IoT:1132ms DCM >3x faster

DCM vs AES256

For More Information: Keith Barnes Vice President Global Business Development | AgilePQ 402 W Broadway Ste 1790, San Diego, CA 92101 kbarnes@agilepq.com www.AgilePQ.com 443.928.7307