Symmetric key encryption new approach

Post on 28-Nov-2014

448 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

Transcript

To The World of Data SecurityWith Encryption Technology

Based on 1024bit symmetric key encryption standard

New Approach

Today we‘ll talk about “Symmetric Key Encryption”differently than we are used to.

Today we‘ll talk about “Symmetric Key Encryption”differently than we are used to.

OK, Do I need

special Knowledge

for that?

No No…

Not at a

ll

Today we‘ll talk about “Symmetric Key Encryption”differently than we are used to.

OK, Do I need

special Knowledge

for that?

What we can tell

you about this

procedure...

It’s….

Unique

It’s….

Secured

It’s….

Real fast

It’s….

Easy to use

It’s….

...and when there is any critical information...

We're at your

finger tips…

http://www.clape.io/

http://www.asthaitsolutions.com/

Now it’s time to get a ride of our

“Symmetric Key Encryption Procedure”

Ready?

Let’s go…

Let’s go…

ONE thing we can

Deliver during the

journey

... it‘s this ...

Re-Consider The Technology

Which YOU are using

Right now

Let us Revise the History at a glance

• Originally developed by IBM in 1970s, later adopted by U.S. government in 1977

• Encryption of 64-bit plaintext using a 56-bit key

• Relatively inexpensive to implement in hardware and widely available

• Largest users: financial transactions, PIN code generation, etc.

We‘ll tell you about

3 things today.

Current Tends Our Message New approach

Current Tends

Using Block Ciphers

• Encrypt a group of plaintext as one block and produces a block of cipher text

Latest ParametersBlock size: minimum 128 bits, 256

Key size: 128, 192, 256 bits

Disadvantages:

• Slowness of encryption Error propagation

• Needs to be maintained

Disadvantages:

• Slowness of encryption Error propagation

• High costs

• Needs to be maintained

Disadvantages:

• Slowness of encryption Error propagation

• Compatibility• High costs

• Needs to be maintained

Disadvantages:

• Slowness of encryption Error propagation

• Time consuming for the computer

• Compatibility• High costs

• Needs to be maintained

Disadvantages:

• Slowness of encryption Error propagation

... Above all of those ...

Our Message is…

You may’ve to face

ATTACKS Like….

For over coming all the obstacles on the path

You must have to adopt…

Our new approach

Now it’s “SHOW TIME” for our New Approach….

And that is….

Now it’s “SHOW TIME” for our New Approach….

Our Innovation

Our Innovation

Our Technology

Our Innovation

Our Technology

Our cipher design principle

Our Innovation

Our Technology

…And Speed Comparison of our

Our cipher design principle

Encryption algorithms Technology

Our Innovation

Our Innovation

Based on our own patent We have invented a New 1024 bit Symmetric Key Encryption Standard Entitled as…

“A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC

COMMUNICATIONS.”

http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2011/pat_arch_122011/official_journal_02122011_part_i.pdf

htt p://ip india.n ic.in/ipr/patent/journal_archieve/journal_2012/pat_arch_082012/offi cial_ journal_24082012_part_ i.pdf

http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2012/pat_arch_082012/official_journal_24082012_part_i.pdf

htt p://appft .uspto.gov/netacgi/nph-Parser?Sect1=PTO 1& Sect2=H ITO FF& d=PG 01& p=1& u=% 2Fnetahtm l% 2FPTO % 2Fsrchnum .htm l& r=1& f=G & l=50& s1=% 2220130028419% 22.PG N R .& O S=D N /20130028419& RS=D N /20130028419

http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220130028419%22.PGNR.&OS=DN/20130028419&RS=DN/20130028419

Our TechnologyThe mechanism :

Our crypto procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key.

Our TechnologyThe mechanism :

Our crypto procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key.

Our TechnologyThe mechanism :

And Other than that…

•The technology a basic building block, which encrypts / decrypts a fixed size block of data.

Our Technology

•The technology a basic building block, which encrypts / decrypts a fixed size block of data.

Our Technology

•To use these in practice, we usually need to handle arbitrary amount of data

•The technology a basic building block, which encrypts / decrypts a fixed size block of data.

Our Technology

•To use these in practice, we usually need to handle arbitrary amount of data

•The data may be available in advance, (in which case a block mode is appropriate).

…Now you can say…

Unique

It’s Truly…

Our cipher design principle

Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.

Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.

•Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.

Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.

•Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.

•responsibility of securing the password/Cipher Key of the user rests on the Encryption Technology.

Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.

•Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.

•responsibility of securing the password/Cipher Key of the user rests on the Encryption Technology.

•There is no need for using salts/pass phrases in this technology for strengthening the password

So our cipher design

principle is..

So our cipher design

principle is..

Secured

Now it’s time to compare The Speed of our

Encryption algorithms Technology

Based on some scrutiny and cryptanalysis, We are confident that our encryption standard will survive this process and shall eventually become a new standard.

Based on some scrutiny and cryptanalysis, We are confident that our encryption standard will survive this process and shall eventually become a new standard.

Let see some examples….

Before we start, we’ve to

clarify some thing & that

is….

Specifications of Hardware components utilized to make the under mentioned speed

comparison test :

•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM

Specifications of Hardware components utilized to make the under mentioned speed

comparison test :

•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM

Specifications of Hardware components utilized to make the under mentioned speed

comparison test :

•Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.

•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM

Specifications of Hardware components utilized to make the under mentioned speed

comparison test :

•Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.

• All the tests have been performed on commonly known file formats

•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM

Specifications of Hardware components utilized to make the under mentioned speed

comparison test :

•Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.

• All the tests have been performed on commonly known file formats

•All the test reports are based on base 64 encoding.

Time Comparison of encryption algorithms

Decryption Time (in milliseconds)

Encryption Time (in milliseconds) for

Medium Sized files

Decryption Time (in milliseconds) for Medium

Sized files

Encryption Time (in milliseconds)

Decryption Time (in milliseconds)

Graph showing time consumption for encryption with different key sizes for a

specific size of File (7.14MB) on our technology.

Graph showing time consumption for decryption with different key sizes for a

specific size of File (7.14MB) on our technology.

Graph showing time consumption for encryption with different key sizes for a

specific size of File (694 Kb) on our technology.

Graph showing time consumption for decryption with different key sizes for a

specific size of File (694 Kb) on our technology.

So….

Real fast & Secured

It’s….

If you Consider its Compatibility

If you Consider its Compatibility

• It is compatible to XP, Vista, Windows 7, Linux & Mac (OSX). Platforms.

And obviously it’s….

Easy to use

And obviously it’s….

Now It’s right time to Re-Consider

The Technology

Which YOU

are using

Right now

Acknowledgement:- International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010} International Business Information Management Association (IBIMA).

top related