Presentation is loading. Please wait.

Presentation is loading. Please wait.

STRATEGIC ENCRYPTION www.crypto-logica.com. 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY.

Similar presentations


Presentation on theme: "STRATEGIC ENCRYPTION www.crypto-logica.com. 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY."— Presentation transcript:

1 STRATEGIC ENCRYPTION www.crypto-logica.com

2 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY hash length Brutal force security Secure against computing developments Any cryptanalysis security Linear cryptanalysis security Differential cryptanalysis security No backdoor for decryption without a key Future proof – available today Encryption with ANY key length Authentication with ANY hash length Brutal force security Secure against computing developments Any cryptanalysis security Linear cryptanalysis security Differential cryptanalysis security No backdoor for decryption without a key

3 3. ALGORITHM FEATURES Non-polynomial (NP) key finding problem Key lengths chosen for NP problem No matrix operations No vector operations No S-boxes Simple non-linear arithmetic operations Huge bit diffusion Huge bit confusion Perfect randomness Non-polynomial (NP) key finding problem Key lengths chosen for NP problem No matrix operations No vector operations No S-boxes Simple non-linear arithmetic operations Huge bit diffusion Huge bit confusion Perfect randomness

4 4. ANY KEY LENGTH CryptoLogica Team is developing its own public key encryption besides already developed symmetric key encryption and hash

5 5. DEVELOPED TECHNOLOGY 4 simple stream methods 4 hybrid symmetric stream methods 4 hybrid symmetric block methods 8 hybrid hash methods Zero encryption overhead Identical ciphertext and plaintext bitrate Identical ciphertext and plaintext file size Key length from 256 to 4.294.967.296 bits Speed almost independent on key length 4 simple stream methods 4 hybrid symmetric stream methods 4 hybrid symmetric block methods 8 hybrid hash methods Zero encryption overhead Identical ciphertext and plaintext bitrate Identical ciphertext and plaintext file size Key length from 256 to 4.294.967.296 bits Speed almost independent on key length

6 6. DEVELOPED ENCRYPTION METHODS TYPE ENCRYPTION METHODKEY LENGTH [bits] BLOCK [bits] SHORTLONGMINMAX StreamCLISIdeal Stream (4)2564096 ∞ StreamCLOSOccult Stream256∞128 StreamCLASAdvanced Stream512∞256 StreamCLUSUltimate Stream384∞256 StreamCLESExtreme Stream768∞256 BlockCLOBOccult Block256∞128 BlockCLABAdvanced Block512∞256 BlockCLUBUltimate Block384∞256 BlockCLEBExtreme Block768∞256

7 All stream ciphers except CLIS are hybrid (stream+block) symmetric stream ciphers, wherein the position of each bit in plaintext input stream or file remains intact in ciphertext output stream or file All block ciphers are hybrid (stream+block) symmetric block ciphers, wherein the position of each bit in plaintext input stream or file is diffused within 256 or 128 bit block in ciphertext output stream or file All stream ciphers except CLIS are hybrid (stream+block) symmetric stream ciphers, wherein the position of each bit in plaintext input stream or file remains intact in ciphertext output stream or file All block ciphers are hybrid (stream+block) symmetric block ciphers, wherein the position of each bit in plaintext input stream or file is diffused within 256 or 128 bit block in ciphertext output stream or file 7. TYPE DIFFERENCE

8 Family of customized algorithms Algorithms have adjustable parameters User can change algorithm parameters Enormous increase of number of methods Additional customized algorithm security Unknown algorithm for unauthorized Private algorithm provides open solution No extraction of customized parameters by anyone including Crypto Logica Team Family of customized algorithms Algorithms have adjustable parameters User can change algorithm parameters Enormous increase of number of methods Additional customized algorithm security Unknown algorithm for unauthorized Private algorithm provides open solution No extraction of customized parameters by anyone including Crypto Logica Team 8. ALGORITHM CUSTOMIZATION

9 Stream Offset Stream Sum Stream Counter Stream Increment Parameters’ width depends on internal data: 8 x 8-bit (64-bit total) for 8-bit data 8 x 16 bit (128-bits total) for 16-bit data 8 x 32 bit (256-bits total) for 32-bit data 8 x 64 bit (512-bits total) for 64-bit data Stream Offset Stream Sum Stream Counter Stream Increment Parameters’ width depends on internal data: 8 x 8-bit (64-bit total) for 8-bit data 8 x 16 bit (128-bits total) for 16-bit data 8 x 32 bit (256-bits total) for 32-bit data 8 x 64 bit (512-bits total) for 64-bit data 9. CIPHER PARAMETERS Block Offset Block Rounds Block Counter Block Increment Block Offset Block Rounds Block Counter Block Increment

10 Stream Offset Stream Sum Stream Counter Stream Increment Hash Length Hash Length is completely freely chosen Hash Length can be any number Hash Signature is completely freely chosen Hash Signature can be any number Stream Offset Stream Sum Stream Counter Stream Increment Hash Length Hash Length is completely freely chosen Hash Length can be any number Hash Signature is completely freely chosen Hash Signature can be any number 10. HASH PARAMETERS Block Offset Block Rounds Block Counter Block Increment Hash Signature Block Offset Block Rounds Block Counter Block Increment Hash Signature

11 11. SPEED @ SINGLE THREAD i7 2.2GHz TYPETYPE NATIVE CL ALGORITHM VS AES CTR OPTIMIZED KEY LENGTH [bits] BLOCK SIZE [bits] ENC/DEC SPEED [Gbit/s] CL SPEED AES SPEED B AES CTR2561281,4011 S CLIS4096 ∞ 6,7524,819 S CLOS40961285,3083,789 S CLAS40962566,6634,756 S CLUS40962566,8344,878 S CLES40962564,5443,243 B CLOB40961285,2633,757 B CLAB40962566,7994,853 BCLUB40962566,5944,707 BCLEB40962564,6403,312

12 12. ENCRYPTION/DECRYPTION SPEED Faster encryption / decryption than AES Smaller cipher / decipher latency Cipher / decipher power and cost savings Faster encryption / decryption than AES Smaller cipher / decipher latency Cipher / decipher power and cost savings

13 13. NIST STS 2.1 RANDOMNESS TESTS CRYPTOLOGICA methods pass all NIST STS 2.1 tests, determining whether or not the sequence can be considered random. For example:

14 WORLDWIDE REPRESENTATIVE Prof. dr. Milan Prokin +381-11-3016-595, +381-11-3016-596 +1-310-880-9030, +381-64-4557-702 proka@el.etf.rs, milan.prokin@gmail.com Prof. dr. Milan Prokin +381-11-3016-595, +381-11-3016-596 +1-310-880-9030, +381-64-4557-702 proka@el.etf.rs, milan.prokin@gmail.com Michael Collins +1-410-326-3001 +1-410-320-7906 mc@ciffbe.com Michael Collins +1-410-326-3001 +1-410-320-7906 mc@ciffbe.com U.S. REPRESENTATIVE


Download ppt "STRATEGIC ENCRYPTION www.crypto-logica.com. 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY."

Similar presentations


Ads by Google