Presentation is loading. Please wait.

Presentation is loading. Please wait.

STRATEGIC ENCRYPTION www.crypto-logica.com.

Similar presentations


Presentation on theme: "STRATEGIC ENCRYPTION www.crypto-logica.com."— Presentation transcript:

1 STRATEGIC ENCRYPTION

2 2. SECURITY PROBLEMS & SOLUTION
Features of Crypto-Logica Key Exchange, Encryption and Hash Future proof due to both ultimate security and ultimate speed Unlimited key length (chosen by hardware/software embodiment) Unlimited hash length (chosen by hardware/software embodiment) Provable security against both quantum and classic computers Brutal force security due to longer keys Linear cryptanalysis security due to non-polynomial key finding Differential cryptanalysis security without weak keys Provable security of key exchange due to symmetric algorithms Provable security of data encryption due to symmetric algorithms Provable security of authentication due to symmetric algorithms

3 3. METHOD PROBLEMS & SOLUTION
Features of Crypto-Logica Key Exchange, Encryption and Hash No complex operations for simple hardware/software embodiment No matrix operations for simple hardware/software embodiment No vector operations for simple hardware/software embodiment No substitution (S) boxes for preventing side-channel attack Simple non-linear arithmetic for simple embodiments Simple design without a “trap door” preventing key finding Family of algorithms for further development and customization Optional unpublished algorithms for maximum top security Customizable algorithms for government security User adjustable parameters for mission-critical security

4 4. TECHNICAL PROBLEMS & SOLUTION
Features of Crypto-Logica Key Exchange, Encryption and Hash Highest encryption speed (several Gbit/s) on a single CPU thread Highest hashing speed (several Gbit/s) on a single CPU thread Ultralow latency for easy plug-in into current and new designs Small processing complexity for any hardware platform Small memory size for immediate applications anywhere Small memory bandwidth preventing memory bus bottleneck Low power consumption for portable and unattended devices Low heat dissipation for stealth and undercover operations Small weight of platform hardware for portable and aerial devices Small size of platform hardware for small devices

5 5. PRACTICAL PROBLEMS & SOLUTION
Features of Crypto-Logica Key Exchange, Encryption and Hash Low cost platform hardware for massive deployment Low cost platform software for massive deployment Runs on any platform for installation on already deployed assets Simple and fast interfacing with top level applications Huge bit confusion by stream and block ciphers Huge bit diffusion by block ciphers Almost perfect randomness by stream and block ciphers Integer arithmetic running on any platform No multiplication for fast execution on general purpose processors No division for fast execution on general purpose processors

6 6. CRYPTO-LOGICA SOLUTIONS
Crypto-Logica Team developed its own key exchange, symmetric key encryption and hash authentication

7 7. CRYPTO-LOGICA METHODS
TYPE ENCRYPTION METHOD KEY LENGTH [bits] BLOCK [bits] SHORT LONG MIN MAX Stream CLIS Ideal Stream (4) 256 4096 CLOS Occult Stream 128 CLAS Advanced Stream 512 CLUS Ultimate Stream 384 CLES Extreme Stream 768 Block CLOB Occult Block CLAB Advanced Block CLUB Ultimate Block CLEB Extreme Block

8 8. SPEED @ SINGLE THREAD i7 2.2GHz
Y P E NATIVE CL ALGORITHM VS AES CTR OPTIMIZED KEY LENGTH [bits] BLOCK SIZE ENC/DEC SPEED [Gbit/s] CL SPEED AES SPEED B AES CTR 256 128 1,401 1 S CLIS 4096 6,752 4,819 CLOS 5,308 3,789 CLAS 6,663 4,756 CLUS 6,834 4,878 CLES 4,544 3,243 CLOB 5,263 3,757 CLAB 6,799 4,853 CLUB 6,594 4,707 CLEB 4,640 3,312

9 9. USER ADJUSTABLE PARAMETERS
Crypto-Logica solutions User parameters Size [bits] Hybrid stream ciphers Key length 256..4,294,967,296 Hybrid block ciphers Hash signature 4 simple stream methods Hash length ,536 4 hybrid stream methods Stream offset 8, 16, 32 or 64 4 hybrid block methods Stream sum 8 hybrid hash methods Stream counter Zero encryption overhead Stream increment Identical ciphertext and plaintext bitrate Block offset Identical ciphertext and plaintext file size Block rounds Encryption speed almost independent on key length Block counter Hash speed almost independent on signature Block Increment

10 10. NIST STS 2.1 RANDOMNESS TESTS
CRYPTO-LOGICA methods passed all NIST STS 2.1 tests, determining whether or not the sequence can be considered random, while being many times faster than AES. For example: CRYPTO-LOGICA methods solved all security, method, technical and practical problems in key exchange, symmetric key encryption and hash authentication, both now and in the future!


Download ppt "STRATEGIC ENCRYPTION www.crypto-logica.com."

Similar presentations


Ads by Google