STRATEGIC ENCRYPTION www.crypto-logica.com. 2. SECURITY Future proof – available today Absolute technical security Secure against computing developments.

Slides:



Advertisements
Similar presentations
STRATEGIC ENCRYPTION
Advertisements

Kasumi Block Cipher Data Encryptors Darshan Gandhi Rushabh Pasad.
Random Number Generation & Testing Juan Soto 301/
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
T.Sharon-A.Frank 1 Multimedia Compression Basics.
Windows XP Photo Workflow Tim Grey Imaging Strategist Microsoft Corporation.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
1 A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application This contribution discusses some aspects of testing.
STRATEGIC ENCRYPTION 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY.
Cryptography and Network Security Chapter 3
CS457 – Introduction to Information Systems Security Cryptography 1b Elias Athanasopoulos
Principles of Information Security, 2nd edition1 Cryptography.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
Chapter 5 Cryptography Protecting principals communication in systems.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
A Cryptography Tutorial Jim Xu College of Computing Georgia Tech
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Database Key Management CSCI 5857: Encoding and Encryption.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Objectives Learn what a file system does
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
2. CL TOTALCRYPT UE Ultimate security level Government systems Security agencies Intelligence agencies Special users Defense Ultimate security level Government.
 Design model for a computer  Named after John von Neuman  Instructions that tell the computer what to do are stored in memory  Stored program Memory.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
CIFF TECHNOLOGY CORPORATION
STRATEGIC ENCRYPTION 2. SECURITY Future proof – available today Absolute technical security Secure against computing developments.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Data and its manifestations. Storage and Retrieval techniques.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Pretty Good Privacy (PGP) Security for Electronic .
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Lecture 2: Introduction to Cryptography
06/12/2015Applied Algorithmics - week41 Non-periodicity and witnesses  Periodicity - continued If string w=w[0..n-1] has periodicity p if w[i]=w[i+p],
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Radix Sort and Hash-Join for Vector Computers Ripal Nathuji 6.893: Advanced VLSI Computer Architecture 10/12/00.
STRATEGIC ENCRYPTION 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
2. TOTALCRYPT Standard security level Personal use Working groups Social networks Small and medium size business Standard security level Personal use.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
ECE 101 An Introduction to Information Technology Information Coding.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
Electronic Banking & Security Electronic Banking & Security.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Information Technology (IT). Information Technology – technology used to create, store, exchange, and use information in its various forms (business data,
Triple DES.
STRATEGIC ENCRYPTION
Security through Encryption
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Computer Application Waseem Gulsher
Image Coding and Compression
International Data Encryption Algorithm
Presentation transcript:

STRATEGIC ENCRYPTION

2. SECURITY Future proof – available today Absolute technical security Secure against computing developments Any crypto-analysis security Linear cryptoanalysis security Differential cryptoanalysis security Brutal force security (up to 4096-bit key) No backdoor for decryption without a key No reverse engineering at all Future proof – available today Absolute technical security Secure against computing developments Any crypto-analysis security Linear cryptoanalysis security Differential cryptoanalysis security Brutal force security (up to 4096-bit key) No backdoor for decryption without a key No reverse engineering at all

3. SEVEN ENCRYPTION METHODS TYPETYPE ENCRYPTION METHOD KEY LENGTH [bits] BLOCK [bits] SHORTLONGMINMAX BSBCShort Block Cipher BLBCLong Block Cipher BUBCUltimate Block Cipher BUBEUBC Extended HSHCShort Hybrid Cipher HHESHybrid Encryption Solution SSTEStream Extended Cipher2048∞ B = BLOCK CIPHER H = HYBRID CIPHER S = STREAM CIPHER B = BLOCK CIPHER H = HYBRID CIPHER S = STREAM CIPHER

Family of customized algorithms Algorithms have adjustable parameters User can change algorithm parameters Additional customized algorithm security Unknown algorithm for unauthorized Private algorithm provides open solution No extraction of customized parameters Even Crypto Logica Team cannot extract customized parameters Family of customized algorithms Algorithms have adjustable parameters User can change algorithm parameters Additional customized algorithm security Unknown algorithm for unauthorized Private algorithm provides open solution No extraction of customized parameters Even Crypto Logica Team cannot extract customized parameters 4. ALGORITHM CUSTOMIZATION

6. TOTALCRYPT Standard security level Personal use Working groups Social networks Small and medium size business Standard security level Personal use Working groups Social networks Small and medium size business

7. TOTALCRYPT+ Advanced security level Bank systems Stock exchange Hi-tech business Municipality Police Advanced security level Bank systems Stock exchange Hi-tech business Municipality Police

8. TOTALCRYPT UE Ultimate security level Government systems Security agencies Intelligence agencies Special users Defense Ultimate security level Government systems Security agencies Intelligence agencies Special users Defense

9. KEY GENERATION User password with at least 16-characters 1-bit difference in two passwords provides two completely different uncorrelated keys Key is not stored in any peripheral memory media in any form Lost password prevents decryption Any secure public key cryptography can be used for key exchange Crypto Logica Team is developing its own fast public key cryptography User password with at least 16-characters 1-bit difference in two passwords provides two completely different uncorrelated keys Key is not stored in any peripheral memory media in any form Lost password prevents decryption Any secure public key cryptography can be used for key exchange Crypto Logica Team is developing its own fast public key cryptography

10. SPEED, LATENCY, POWER, COST Faster encryption than AES Smaller encrypter latency Encrypter power savings Smaller encrypter cost Faster decryption than AES Smaller decrypter latency Decrypter power savings Smaller decrypter cost Maximum processor efficiency Faster encryption than AES Smaller encrypter latency Encrypter power savings Smaller encrypter cost Faster decryption than AES Smaller decrypter latency Decrypter power savings Smaller decrypter cost Maximum processor efficiency

11. Core2Duo 2.66GHz TYPETYPE ALGORITHM KEY LENGTH [bits] BLOCK SIZE [bits] ENC/DEC SPEED [Mbit/s] ALG SPEED AES SPEED BAES (Ref) BAES CTR BSBC BLBC BUBC BUBE HSHC HHES HHES SSTE

12. ENCRYPTION/DECRYPTION SPEED

13. SPEED / AES SPEED

14. ALGORITHM FEATURES Non-polynomial (NP) key finding problem Key lengths chosen for NP problem No matrix operations No vector operations Simple non-linear arithmetic operations Huge bit diffusion Huge bit confusion Perfect randomness Entropy close to theoretical maximum Non-polynomial (NP) key finding problem Key lengths chosen for NP problem No matrix operations No vector operations Simple non-linear arithmetic operations Huge bit diffusion Huge bit confusion Perfect randomness Entropy close to theoretical maximum

15. NIST STS 2.1 RANDOMNESS TESTS Frequency (Monobit) Test determines whether the numbers of ones and zeros in a sequence are approximately the same.

16. NIST STS 2.1 RANDOMNESS TESTS Frequency Test within a Block determines whether the frequency of ones in an M-bit block is approximately M/2.

17. NIST STS 2.1 RANDOMNESS TESTS Cumulative Sums (Cusum-Forward) Test determines whether the cumulative sum of the partial sequences occurring in the tested sequence is too large or too small.

18. NIST STS 2.1 RANDOMNESS TESTS Cumulative Sums (Cusum-Reverse) Test determines whether the cumulative sum of the partial sequences occurring in the tested sequence is too large or too small.

19. NIST STS 2.1 RANDOMNESS TESTS Runs Test determines whether the number of runs (uninterrupted sequence of identical bits) of ones and zeros of various lengths is as expected for a random seq.

20. NIST STS 2.1 RANDOMNESS TESTS Test for the Longest Run of Ones in a Block determines whether the length of the longest run of ones is consistent with the expected length.

21. NIST STS 2.1 RANDOMNESS TESTS Binary Matrix Rank Test determines the linear dependence among fixed length substrings of the original sequence.

22. NIST STS 2.1 RANDOMNESS TESTS Discrete Fourier Transform (Spectral) Test detects periodic features (i.e. repetitive patterns that are near each other).

23. NIST STS 2.1 RANDOMNESS TESTS Non-overlapping Template Matching Test detects too many occurences of a given non-periodic (aperiodic) pattern.

24. NIST STS 2.1 RANDOMNESS TESTS Overlapping Template Matching Test determines the number of occurrences of pre-specified target strings.

25. NIST STS 2.1 RANDOMNESS TESTS Mauer’s “Universal Statistical” Test detects whether or not the sequence can be significantly compressed without loss of information.

26. NIST STS 2.1 RANDOMNESS TESTS Approximate Entropy Test compares the frequency of all possible overlapping m-bit patterns across the entire sequence.

27. NIST STS 2.1 RANDOMNESS TESTS Random Excursions Test determines if the number of visits to a particular state within a cycle deviates from expected.

28. NIST STS 2.1 RANDOMNESS TESTS Random Excursions Variant Test detects deviations from the expected number of visits to various states in the random walk.

29. NIST STS 2.1 RANDOMNESS TESTS Serial Test 1 determines whether the number of occurrences of the 2^m m-bit overlapping patterns is approximately the same.

30. NIST STS 2.1 RANDOMNESS TESTS Serial Test 2 determines whether the number of occurrences of the 2^m m-bit overlapping patterns is approximately the same.

31. NIST STS 2.1 RANDOMNESS TESTS Linear Complexity Test determines whether or not the sequence is complex enough to be considered random.

32. COMPUTER APPLICATIONS File encryption Protocol encryption Folder encryption USB flash encryption Hard drive encryption Optical drive encryption Encryption processors File encryption Protocol encryption Folder encryption USB flash encryption Hard drive encryption Optical drive encryption Encryption processors

33. VIDEO APPLICATIONS Video editing / postprocessing Movie edit master & archive Mobile TV (4G, 3G) IPTV Cable TV Satellite TV Digital terrestrial TV Video encoder Set-top box Video editing / postprocessing Movie edit master & archive Mobile TV (4G, 3G) IPTV Cable TV Satellite TV Digital terrestrial TV Video encoder Set-top box

34. HARDWARE ENCRYPTION Lowest cost No dividers No multipliers Ultralow power Integer arithmetic Very low complexity Small integrated memory Ultrafast encryption and decryption Easy radiation hardening Lowest cost No dividers No multipliers Ultralow power Integer arithmetic Very low complexity Small integrated memory Ultrafast encryption and decryption Easy radiation hardening

35. FINANCIAL APPLICATIONS Database Remote personnal banking Remote corporative banking Interbank communication Automatic teller machines (ATM) Credit card reader (POS-EFT) Stock – broker communication Broker – investor communication Database Remote personnal banking Remote corporative banking Interbank communication Automatic teller machines (ATM) Credit card reader (POS-EFT) Stock – broker communication Broker – investor communication

MAMMOGRAPHY COMPUTERIZED TOMOGRAPHY MAGNETIC RESONANCE IMAGING ULTRASONOGRAPHY X-RADIOGRAPHY TELEMEDICINE Mammography Computerized tomography Magnetic resonance imaging Ultrasonography X-Radiography Telemedicine Mammography Computerized tomography Magnetic resonance imaging Ultrasonography X-Radiography Telemedicine 36. MEDICAL APPLICATIONS

Unmanned & manned vehicles Warfighters Satellites Surveillance Telemedicine Smart weapons Loitering weapons Face recognition for laser-guided bullets EO, IR, SAR & Hyperspectral sensors Unmanned & manned vehicles Warfighters Satellites Surveillance Telemedicine Smart weapons Loitering weapons Face recognition for laser-guided bullets EO, IR, SAR & Hyperspectral sensors 37. DEFENSE APPLICATIONS

WORLDWIDE REPRESENTATIVE Prof. dr. Milan Prokin , , Prof. dr. Milan Prokin , , Michael Collins Michael Collins U.S. REPRESENTATIVE