Upload
mdhar123
View
451
Download
0
Embed Size (px)
DESCRIPTION
Citation preview
To The World of Data SecurityWith Encryption Technology
Based on 1024bit symmetric key encryption standard
New Approach
Today we‘ll talk about “Symmetric Key Encryption”differently than we are used to.
Today we‘ll talk about “Symmetric Key Encryption”differently than we are used to.
OK, Do I need
special Knowledge
for that?
No No…
Not at a
ll
Today we‘ll talk about “Symmetric Key Encryption”differently than we are used to.
OK, Do I need
special Knowledge
for that?
What we can tell
you about this
procedure...
It’s….
Unique
It’s….
Secured
It’s….
Real fast
It’s….
Easy to use
It’s….
...and when there is any critical information...
We're at your
finger tips…
http://www.clape.io/
http://www.asthaitsolutions.com/
Now it’s time to get a ride of our
“Symmetric Key Encryption Procedure”
Ready?
Let’s go…
Let’s go…
ONE thing we can
Deliver during the
journey
... it‘s this ...
Re-Consider The Technology
Which YOU are using
Right now
Let us Revise the History at a glance
• Originally developed by IBM in 1970s, later adopted by U.S. government in 1977
• Encryption of 64-bit plaintext using a 56-bit key
• Relatively inexpensive to implement in hardware and widely available
• Largest users: financial transactions, PIN code generation, etc.
We‘ll tell you about
3 things today.
Current Tends Our Message New approach
Current Tends
Using Block Ciphers
• Encrypt a group of plaintext as one block and produces a block of cipher text
Latest ParametersBlock size: minimum 128 bits, 256
Key size: 128, 192, 256 bits
Disadvantages:
• Slowness of encryption Error propagation
• Needs to be maintained
Disadvantages:
• Slowness of encryption Error propagation
• High costs
• Needs to be maintained
Disadvantages:
• Slowness of encryption Error propagation
• Compatibility• High costs
• Needs to be maintained
Disadvantages:
• Slowness of encryption Error propagation
• Time consuming for the computer
• Compatibility• High costs
• Needs to be maintained
Disadvantages:
• Slowness of encryption Error propagation
... Above all of those ...
Our Message is…
You may’ve to face
ATTACKS Like….
…Recent attacks on existing workhorse algorithms
http://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show-mathematically-crackable-flaws-in-common-web-encryption/
http://arstechnica.com/security/2013/02/lucky-thirteen-attack-snarfs-cookies-protected-by-ssl-encryption/
http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
http://www.isg.rhul.ac.uk/~kp/padding.pdf
http://www.pcworld.com/article/2036563/livingsocials-breach-draws-advice-from-security-experts.html/
For over coming all the obstacles on the path
You must have to adopt…
Our new approach
Now it’s “SHOW TIME” for our New Approach….
And that is….
Now it’s “SHOW TIME” for our New Approach….
Our Innovation
Our Innovation
Our Technology
Our Innovation
Our Technology
Our cipher design principle
Our Innovation
Our Technology
…And Speed Comparison of our
Our cipher design principle
Encryption algorithms Technology
Our Innovation
Our Innovation
Based on our own patent We have invented a New 1024 bit Symmetric Key Encryption Standard Entitled as…
“A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC
COMMUNICATIONS.”
http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2011/pat_arch_122011/official_journal_02122011_part_i.pdf
htt p://ip india.n ic.in/ipr/patent/journal_archieve/journal_2012/pat_arch_082012/offi cial_ journal_24082012_part_ i.pdf
http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2012/pat_arch_082012/official_journal_24082012_part_i.pdf
htt p://appft .uspto.gov/netacgi/nph-Parser?Sect1=PTO 1& Sect2=H ITO FF& d=PG 01& p=1& u=% 2Fnetahtm l% 2FPTO % 2Fsrchnum .htm l& r=1& f=G & l=50& s1=% 2220130028419% 22.PG N R .& O S=D N /20130028419& RS=D N /20130028419
http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220130028419%22.PGNR.&OS=DN/20130028419&RS=DN/20130028419
Our TechnologyThe mechanism :
Our crypto procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key.
Our TechnologyThe mechanism :
Our crypto procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key.
Our TechnologyThe mechanism :
And Other than that…
•The technology a basic building block, which encrypts / decrypts a fixed size block of data.
Our Technology
•The technology a basic building block, which encrypts / decrypts a fixed size block of data.
Our Technology
•To use these in practice, we usually need to handle arbitrary amount of data
•The technology a basic building block, which encrypts / decrypts a fixed size block of data.
Our Technology
•To use these in practice, we usually need to handle arbitrary amount of data
•The data may be available in advance, (in which case a block mode is appropriate).
…Now you can say…
Unique
It’s Truly…
Our cipher design principle
Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.
Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.
•Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.
Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.
•Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.
•responsibility of securing the password/Cipher Key of the user rests on the Encryption Technology.
Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.
•Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.
•responsibility of securing the password/Cipher Key of the user rests on the Encryption Technology.
•There is no need for using salts/pass phrases in this technology for strengthening the password
So our cipher design
principle is..
So our cipher design
principle is..
Secured
Now it’s time to compare The Speed of our
Encryption algorithms Technology
Based on some scrutiny and cryptanalysis, We are confident that our encryption standard will survive this process and shall eventually become a new standard.
Based on some scrutiny and cryptanalysis, We are confident that our encryption standard will survive this process and shall eventually become a new standard.
Let see some examples….
Before we start, we’ve to
clarify some thing & that
is….
Specifications of Hardware components utilized to make the under mentioned speed
comparison test :
•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM
Specifications of Hardware components utilized to make the under mentioned speed
comparison test :
•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM
Specifications of Hardware components utilized to make the under mentioned speed
comparison test :
•Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.
•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM
Specifications of Hardware components utilized to make the under mentioned speed
comparison test :
•Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.
• All the tests have been performed on commonly known file formats
•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM
Specifications of Hardware components utilized to make the under mentioned speed
comparison test :
•Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.
• All the tests have been performed on commonly known file formats
•All the test reports are based on base 64 encoding.
Time Comparison of encryption algorithms
Decryption Time (in milliseconds)
Encryption Time (in milliseconds) for
Medium Sized files
Decryption Time (in milliseconds) for Medium
Sized files
Encryption Time (in milliseconds)
Decryption Time (in milliseconds)
Graph showing time consumption for encryption with different key sizes for a
specific size of File (7.14MB) on our technology.
Graph showing time consumption for decryption with different key sizes for a
specific size of File (7.14MB) on our technology.
Graph showing time consumption for encryption with different key sizes for a
specific size of File (694 Kb) on our technology.
Graph showing time consumption for decryption with different key sizes for a
specific size of File (694 Kb) on our technology.
So….
Real fast & Secured
It’s….
If you Consider its Compatibility
If you Consider its Compatibility
• It is compatible to XP, Vista, Windows 7, Linux & Mac (OSX). Platforms.
And obviously it’s….
Easy to use
And obviously it’s….
Now It’s right time to Re-Consider
The Technology
Which YOU
are using
Right now
Acknowledgement:- International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010} International Business Information Management Association (IBIMA).