STRATEGIC ENCRYPTION www.crypto-logica.com. 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY.

Slides:



Advertisements
Similar presentations
STRATEGIC ENCRYPTION
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
STRATEGIC ENCRYPTION 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
Block Ciphers 1 Block Ciphers Block Ciphers 2 Block Ciphers  Modern version of a codebook cipher  In effect, a block cipher algorithm yields a huge.
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 2 Data Encryption algorithms Part II.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
Advanced Encryption Standard. This Lecture Why AES? NIST Criteria for potential candidates The AES Cipher AES Functions and Inverse Functions AES Key.
CSE331: Introduction to Networks and Security Lecture 18 Fall 2002.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Lecture 23 Symmetric Encryption
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Encryption Methods By: Michael A. Scott
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Hybrid Cipher encryption Plain Text Key Cipher Text Key Plain Text IV Hybrid Cipher decryption Hybrid Cipher Note: IV used in encryption is not used in.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Differential Cryptanalysis - quite similar to linear cryptanalysis - exploits the relationship between the difference of two inputs and the difference.
STRATEGIC ENCRYPTION 2. SECURITY Future proof – available today Absolute technical security Secure against computing developments.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Block ciphers Structure of a multiround block cipher
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
AVALANCHE EFFECT IN THE FAMILY OF BLOCK CIPHERS “SD-(n,k)” University “Ss Cyril and Methodius” – Skopje, RM S. Markovski, PhD A. Mileva, MSc D. Gligoroski,
STRATEGIC ENCRYPTION 2. SECURITY Future proof – available today Absolute technical security Secure against computing developments.
Lecture 2: Introduction to Cryptography
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Lecture 23 Symmetric Encryption
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Intro to Cryptography Lesson Introduction
Block Cipher- introduction
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
CS519, © A.SelcukDifferential & Linear Cryptanalysis1 CS 519 Cryptography and Network Security Instructor: Ali Aydin Selcuk.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Data Encryption Standard 1977 “New Directions in Cryptography” 1976.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
STRATEGIC ENCRYPTION
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security through Encryption
SOFTWARE IMPLEMENTATION OF OCB MODE
SYMMETRIC ENCRYPTION.
Counter With Cipher Block Chaining-MAC
Counter Mode, Output Feedback Mode
Elect. Codebook, Cipher Block Chaining
Stream Cipher Structure
Presentation transcript:

STRATEGIC ENCRYPTION

2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY hash length Brutal force security Secure against computing developments Any cryptanalysis security Linear cryptanalysis security Differential cryptanalysis security No backdoor for decryption without a key Future proof – available today Encryption with ANY key length Authentication with ANY hash length Brutal force security Secure against computing developments Any cryptanalysis security Linear cryptanalysis security Differential cryptanalysis security No backdoor for decryption without a key

3. ALGORITHM FEATURES Non-polynomial (NP) key finding problem Key lengths chosen for NP problem No matrix operations No vector operations No S-boxes Simple non-linear arithmetic operations Huge bit diffusion Huge bit confusion Perfect randomness Non-polynomial (NP) key finding problem Key lengths chosen for NP problem No matrix operations No vector operations No S-boxes Simple non-linear arithmetic operations Huge bit diffusion Huge bit confusion Perfect randomness

4. ANY KEY LENGTH CryptoLogica Team is developing its own public key encryption besides already developed symmetric key encryption and hash

5. DEVELOPED TECHNOLOGY 4 simple stream methods 4 hybrid symmetric stream methods 4 hybrid symmetric block methods 8 hybrid hash methods Zero encryption overhead Identical ciphertext and plaintext bitrate Identical ciphertext and plaintext file size Key length from 256 to bits Speed almost independent on key length 4 simple stream methods 4 hybrid symmetric stream methods 4 hybrid symmetric block methods 8 hybrid hash methods Zero encryption overhead Identical ciphertext and plaintext bitrate Identical ciphertext and plaintext file size Key length from 256 to bits Speed almost independent on key length

6. DEVELOPED ENCRYPTION METHODS TYPE ENCRYPTION METHODKEY LENGTH [bits] BLOCK [bits] SHORTLONGMINMAX StreamCLISIdeal Stream (4) ∞ StreamCLOSOccult Stream256∞128 StreamCLASAdvanced Stream512∞256 StreamCLUSUltimate Stream384∞256 StreamCLESExtreme Stream768∞256 BlockCLOBOccult Block256∞128 BlockCLABAdvanced Block512∞256 BlockCLUBUltimate Block384∞256 BlockCLEBExtreme Block768∞256

All stream ciphers except CLIS are hybrid (stream+block) symmetric stream ciphers, wherein the position of each bit in plaintext input stream or file remains intact in ciphertext output stream or file All block ciphers are hybrid (stream+block) symmetric block ciphers, wherein the position of each bit in plaintext input stream or file is diffused within 256 or 128 bit block in ciphertext output stream or file All stream ciphers except CLIS are hybrid (stream+block) symmetric stream ciphers, wherein the position of each bit in plaintext input stream or file remains intact in ciphertext output stream or file All block ciphers are hybrid (stream+block) symmetric block ciphers, wherein the position of each bit in plaintext input stream or file is diffused within 256 or 128 bit block in ciphertext output stream or file 7. TYPE DIFFERENCE

Family of customized algorithms Algorithms have adjustable parameters User can change algorithm parameters Enormous increase of number of methods Additional customized algorithm security Unknown algorithm for unauthorized Private algorithm provides open solution No extraction of customized parameters by anyone including Crypto Logica Team Family of customized algorithms Algorithms have adjustable parameters User can change algorithm parameters Enormous increase of number of methods Additional customized algorithm security Unknown algorithm for unauthorized Private algorithm provides open solution No extraction of customized parameters by anyone including Crypto Logica Team 8. ALGORITHM CUSTOMIZATION

Stream Offset Stream Sum Stream Counter Stream Increment Parameters’ width depends on internal data: 8 x 8-bit (64-bit total) for 8-bit data 8 x 16 bit (128-bits total) for 16-bit data 8 x 32 bit (256-bits total) for 32-bit data 8 x 64 bit (512-bits total) for 64-bit data Stream Offset Stream Sum Stream Counter Stream Increment Parameters’ width depends on internal data: 8 x 8-bit (64-bit total) for 8-bit data 8 x 16 bit (128-bits total) for 16-bit data 8 x 32 bit (256-bits total) for 32-bit data 8 x 64 bit (512-bits total) for 64-bit data 9. CIPHER PARAMETERS Block Offset Block Rounds Block Counter Block Increment Block Offset Block Rounds Block Counter Block Increment

Stream Offset Stream Sum Stream Counter Stream Increment Hash Length Hash Length is completely freely chosen Hash Length can be any number Hash Signature is completely freely chosen Hash Signature can be any number Stream Offset Stream Sum Stream Counter Stream Increment Hash Length Hash Length is completely freely chosen Hash Length can be any number Hash Signature is completely freely chosen Hash Signature can be any number 10. HASH PARAMETERS Block Offset Block Rounds Block Counter Block Increment Hash Signature Block Offset Block Rounds Block Counter Block Increment Hash Signature

11. SINGLE THREAD i7 2.2GHz TYPETYPE NATIVE CL ALGORITHM VS AES CTR OPTIMIZED KEY LENGTH [bits] BLOCK SIZE [bits] ENC/DEC SPEED [Gbit/s] CL SPEED AES SPEED B AES CTR ,4011 S CLIS4096 ∞ 6,7524,819 S CLOS ,3083,789 S CLAS ,6634,756 S CLUS ,8344,878 S CLES ,5443,243 B CLOB ,2633,757 B CLAB ,7994,853 BCLUB ,5944,707 BCLEB ,6403,312

12. ENCRYPTION/DECRYPTION SPEED Faster encryption / decryption than AES Smaller cipher / decipher latency Cipher / decipher power and cost savings Faster encryption / decryption than AES Smaller cipher / decipher latency Cipher / decipher power and cost savings

13. NIST STS 2.1 RANDOMNESS TESTS CRYPTOLOGICA methods pass all NIST STS 2.1 tests, determining whether or not the sequence can be considered random. For example:

WORLDWIDE REPRESENTATIVE Prof. dr. Milan Prokin , , Prof. dr. Milan Prokin , , Michael Collins Michael Collins U.S. REPRESENTATIVE