STRATEGIC ENCRYPTION www.crypto-logica.com.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

1 KCipher-2 KDDI R&D Laboratories Inc.. ©KDDI R&D Laboratories Inc. All rights Reserved. 2 Introduction LFSR-based stream ciphers Linear recurrence between.
Symmetric Encryption Prof. Ravi Sandhu.
Hashes and Message Digests
Encryption.
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
ECE454/CS594 Computer and Network Security
Scalable Involutional PP-1 Block Cipher for Limited Resources K. Chmiel, A. Grocholewska-Czuryło, J. Stokłosa Poznan University of Technology Institute.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
L8. Reviews Rocky K. C. Chang, May Foci of this course 2 Rocky K. C. Chang  Understand the 3 fundamental cryptographic functions and how they are.
Lecture 5: Cryptographic Hashes
Lecture 7 Overview. Advanced Encryption Standard 10, 12, 14 rounds for 128, 192, 256 bit keys – Regular Rounds (9, 11, 13) – Final Round is different.
“Advanced Encryption Standard” & “Modes of Operation”
LINEAR FEEDBACK SHIFT REGISTERS, GALOIS FIELDS, AND STREAM CIPHERS Mike Thomsen Cryptography II May 14 th, 2012.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
C1 - Unrestricted Version 1.0 Group R&D 1CMS / EPSRC – Steve Babbage25 th March 2009 Some maths from the telecommunications industry Presented by Dr Steve.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.2 Secret Key Cryptography.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
STRATEGIC ENCRYPTION 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
1 Pertemuan 06 Kriptografi tradisional Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Lecture 23 Symmetric Encryption
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Hybrid Cipher encryption Plain Text Key Cipher Text Key Plain Text IV Hybrid Cipher decryption Hybrid Cipher Note: IV used in encryption is not used in.
STRATEGIC ENCRYPTION 2. SECURITY Future proof – available today Absolute technical security Secure against computing developments.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Chapter 20 Symmetric Encryption and Message Confidentiality.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Block ciphers Structure of a multiround block cipher
Cryptography Team Presentation 2
8.6. Knapsack Ciphers. The Concept At the core of the Knapsack cipher is the Knapsack problem: At the core of the Knapsack cipher is the Knapsack problem:
CS555Spring 2012/Topic 101 Cryptography CS 555 Topic 10: Block Cipher Security & AES.
STRATEGIC ENCRYPTION 2. SECURITY Future proof – available today Absolute technical security Secure against computing developments.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Lecture 23 Symmetric Encryption
The RC5 Encryption Algorithm: Two Years On Lisa Yin RC5 Encryption –Ron Rivest, December 1994 –Fast Block Cipher –Software and Hardware Implementations.
STRATEGIC ENCRYPTION 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY.
Chapter 2 Symmetric Encryption.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
RC6: The Simple Cipher Presenter: Morgan Monger. RC6 Cipher Created by Ronald Rivest et al. for AES submission Follows the evolution of RC5 cipher –Parameterized.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Symmetric Cryptography
Triple DES.
Outline Desirable characteristics of ciphers Uses of cryptography
STRATEGIC ENCRYPTION
Outline Desirable characteristics of ciphers Uses of cryptography
Cryptography Basics and Symmetric Cryptography
AES Objectives ❏ To review a short history of AES
Cryptography Team Presentation 1
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Introduction to Cryptography
Information and Computer Security CPIS 312 Lab 4 & 5
Presentation transcript:

STRATEGIC ENCRYPTION www.crypto-logica.com

2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate security and ultimate speed Unlimited key length (chosen by hardware/software embodiment) Unlimited hash length (chosen by hardware/software embodiment) Secure against faster computers due to longer keys Brutal force security due to longer keys Linear cryptanalysis security due to non-polynomial key finding Differential cryptanalysis security without weak keys Easily provable security due to simple algorithms Security beyond just key length due to user adjustable parameters Side-channel attack security due to lack of S-boxes, etc.

3. METHOD PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Non-polynomial key finding problem against cryptanalysis No matrix operations for simple hardware/software embodiments No vector operations for simple hardware/software embodiments No substitution (S) boxes for preventing side-channel attack Simple non-linear arithmetic for simple embodiments Simple design without a “trap door” preventing key finding Family of algorithms for further development and customization Unpublished algorithms for maximum top security Customizable algorithms for government security User adjustable parameters for mission-critical security

4. TECHNICAL PROBLEMS & SOLUTION Features of Cryptologica Encryption and Hash Highest encryption speed (several Gbit/s) on a single CPU thread Highest hashing speed (several Gbit/s) on a single CPU thread Ultralow latency for easy plug-in into current and new designs Small processing complexity for any hardware platform Small memory size for immediate applications anywhere Small memory bandwidth preventing memory bus bottleneck Low power consumption for portable and unattended devices Low heat dissipation for stealth and undercover operations Small weight of platform hardware for portable and aerial devices Small size of platform hardware for small devices

5. PRACTICAL PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Low cost of platform hardware for massive deployment Low cost of platform software for massive deployment Runs on any platform for installation on already deployed assets Simple and fast interfacing with top level applications Huge bit confusion by stream and block ciphers Huge bit diffusion by block ciphers Almost perfect randomness by stream and block ciphers Integer arithmetic running on any platform No multiplication for fast execution on general purpose processors No division for fast execution on general purpose processors

6. CRYPTOLOGICA SOLUTIONS CryptoLogica Team is developing its own public key encryption besides already developed symmetric key encryption and hash

7. CRYPTOLOGICA METHODS ∞ TYPE ENCRYPTION METHOD KEY LENGTH [bits] BLOCK [bits] SHORT LONG MIN MAX Stream CLIS Ideal Stream (4) 256 4096 ∞ CLOS Occult Stream 128 CLAS Advanced Stream 512 CLUS Ultimate Stream 384 CLES Extreme Stream 768 Block CLOB Occult Block CLAB Advanced Block CLUB Ultimate Block CLEB Extreme Block

8. SPEED @ SINGLE THREAD i7 2.2GHz Y P E NATIVE CL ALGORITHM VS AES CTR OPTIMIZED KEY LENGTH [bits] BLOCK SIZE ENC/DEC SPEED [Gbit/s] CL SPEED AES SPEED B AES CTR 256 128 1,401 1 S CLIS 4096 ∞ 6,752 4,819 CLOS 5,308 3,789 CLAS 6,663 4,756 CLUS 6,834 4,878 CLES 4,544 3,243 CLOB 5,263 3,757 CLAB 6,799 4,853 CLUB 6,594 4,707 CLEB 4,640 3,312

9. USER ADJUSTABLE PARAMETERS CryptoLogica solutions User parameters Size [bits] Hybrid stream ciphers Key length 256..4,294,967,296 Hybrid block ciphers Hash signature 4 simple stream methods Hash length 256..65,536 4 hybrid stream methods Stream offset 8, 16, 32 or 64 4 hybrid block methods Stream sum 8 hybrid hash methods Stream counter Zero encryption overhead Stream increment Identical ciphertext and plaintext bitrate Block offset Identical ciphertext and plaintext file size Block rounds Encryption speed almost independent on key length Block counter Hash speed almost independent on signature Block Increment

10. NIST STS 2.1 RANDOMNESS TESTS CRYPTOLOGICA methods passed all NIST STS 2.1 tests, determining whether or not the sequence can be considered random, while being many times faster than AES. For example: CRYPTOLOGICA methods solved all security, method, technical and practical problems in symmetric key encryption and hash authentication and verification, both now and in the future!

WORLDWIDE REPRESENTATIVE Prof. dr. Milan Prokin +381-11-3016-595, +381-11-3016-596 +1-310-880-9030, +381-64-4557-702 proka@el.etf.rs, milan.prokin@gmail.com U.S. REPRESENTATIVE Michael Collins +1-410-326-3001 +1-410-320-7906 mc@ciffbe.com