Download presentation
Presentation is loading. Please wait.
1
Let’s Rethink Crypto Dr. Ken Dick
1. Sand ½ vs universe. Ken to send KW text – KW to create serious grpahic. 2. Stratcom – longer battery life, lighter load, perhaps on Slide 3. Legacy Systems – Agility, small footprint 4. Stratcom – backgound, why it was invented - came from military
2
Why Should We Care? Protects personal information.
Protects financial information. Protects work information. Protects national information. … you get the idea, crypto is important to all of us.
3
Current State of Affairs
Basis dates back to Claude Shannon’s "A Mathematical Theory of Communication” published in 1948 “It takes a secret to keep a secret” Crypto based on number theory. As compute power has grown, the complexity of cryptography & the key size has grown.
4
For example AES https://www.youtube.com/watch?v=mlzxpkdXP58
Beginning - key coming in and going through 10 cycles. Loop Ken – I didn’t find the exact clip you wanted that would be short enough to embed. See if you can located the 40 seconds that makes the most sense. But the gentleman’s pace of presentation may make it too difficult to embed and have people follow.
5
This Increase Comes At A Cost
Greater processor power is needed. Greater time is needed. The result, crypto has become an inflexible, monolithic algorithm. & Oh by the way it has been back-doored by the NSA.
6
The Goal The goal is obfuscation, the tool is cryptography.
What if we focused more on the goal & came up with a different approach to cryptography?
7
A New Approach In this digital age:
What if we based on crypto on coding theory? What if we could build it such that it is flexible & scalable? What if we could apply it at the packet level, instead of the message level? What if we could create a search space large enough that the probability of exhausting it is extremely small?
8
A New Approach AgilePQ: Next Generation Cryptography
A series of encryption like algorithms that highly randomizes and scrambles data streams This allows for custom layering dependent upon the security needs of the customer Multiple libraries of tables This facilitates the changing of the key at multiple levels Cycled with each frame, packet, or message This further obfuscates the data One pass cycle means CPU is more efficient As opposed to multiple loops as is the mode in current standards. Value A masking algorithm is applied to flatten the distribution which prevents frequency analysis, a fundamental decode practice Less Battery / Lighter Lode
9
A New Approach Earth 10506 1077
10
Validation Points Algorithms: Red Teams
“No known attack” Dr. Russell Impagliazzo UCSD Red Teams UNO, UNSW, & Third Party Patents Reviewed by Leading Cryptographer “Appears to be post quantum” Global Network and Lab Validation Completed: Innovation Lab Demonstrated Functionality & Security Demonstrated Improved DCM Performance vs. AES256 University of New South Wales (World Leader for Red-Team Attack Competitions) – Inserted 32 million packets with no collisions AgilePQ Architecture and Integration Document reviewed and approved by Advanced Services Labs Additional Validation: UCSD Cryptography Professors Evaluated for Mathematical Proof: “No Known Attack Surface” University of Nebraska-Omaha Cryptography; Three Years of Red Team Assaults – No Breaks Ponemon Institute; Nuclear Physicist Red Team Assault – No Breaks Keysight SystemVue Simulation; 2.25x Increase of throughput vs. LTE
11
DCM can beat accelerated AES
Measurements AES 256 DCM Take-Away AES H/W Accelerated 891Mbps 928Mbps DCM can beat accelerated AES Blade Router Test 75Mbps 196Mbps DCM almost line- rate Application to Application 1176ms 96ms DCM >12x faster IoT AES128:4329ms DCM IoT:1132ms DCM >3x faster
12
DCM vs AES256
13
For More Information: Keith Barnes Vice President Global Business Development | AgilePQ 402 W Broadway Ste 1790, San Diego, CA
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.