Top Banner
STRATEGIC ENCRYPTION www.crypto-logica.com
11

STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate.

Mar 26, 2015

Download

Documents

Aaliyah Kane
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate.

STRATEGIC ENCRYPTIONSTRATEGIC ENCRYPTION

www.crypto-logica.comwww.crypto-logica.com

Page 2: STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate.

2. SECURITY PROBLEMS & SOLUTION2. SECURITY PROBLEMS & SOLUTION

Features of CryptoLogica Encryption and Hash

Future proof due to both ultimate security and ultimate speed

Unlimited key length (chosen by hardware/software embodiment)

Unlimited hash length (chosen by hardware/software embodiment)

Secure against faster computers due to longer keys

Brutal force security due to longer keys

Linear cryptanalysis security due to non-polynomial key finding

Differential cryptanalysis security without weak keys

Easily provable security due to simple algorithms

Security beyond just key length due to user adjustable parameters

Side-channel attack security due to lack of S-boxes, etc.

Page 3: STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate.

3. METHOD PROBLEMS & SOLUTION3. METHOD PROBLEMS & SOLUTION

Features of CryptoLogica Encryption and Hash

Non-polynomial key finding problem against cryptanalysis

No matrix operations for simple hardware/software embodiments

No vector operations for simple hardware/software embodiments

No substitution (S) boxes for preventing side-channel attack

Simple non-linear arithmetic for simple embodiments

Simple design without a “trap door” preventing key finding

Family of algorithms for further development and customization

Unpublished algorithms for maximum top security

Customizable algorithms for government security

User adjustable parameters for mission-critical security

Page 4: STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate.

4. TECHNICAL PROBLEMS & SOLUTION4. TECHNICAL PROBLEMS & SOLUTION

Features of Cryptologica Encryption and Hash

Highest encryption speed (several Gbit/s) on a single CPU thread

Highest hashing speed (several Gbit/s) on a single CPU thread

Ultralow latency for easy plug-in into current and new designs

Small processing complexity for any hardware platform

Small memory size for immediate applications anywhere

Small memory bandwidth preventing memory bus bottleneck

Low power consumption for portable and unattended devices

Low heat dissipation for stealth and undercover operations

Small weight of platform hardware for portable and aerial devices

Small size of platform hardware for small devices

Page 5: STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate.

5. PRACTICAL PROBLEMS & SOLUTION5. PRACTICAL PROBLEMS & SOLUTION

Features of CryptoLogica Encryption and Hash

Low cost of platform hardware for massive deployment

Low cost of platform software for massive deployment

Runs on any platform for installation on already deployed assets

Simple and fast interfacing with top level applications

Huge bit confusion by stream and block ciphers

Huge bit diffusion by block ciphers

Almost perfect randomness by stream and block ciphers

Integer arithmetic running on any platform

No multiplication for fast execution on general purpose processors

No division for fast execution on general purpose processors

Page 6: STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate.

6. CRYPTOLOGICA SOLUTIONS6. CRYPTOLOGICA SOLUTIONS

• CryptoLogica Team is developing its own public key encryption besides already developed symmetric key encryption and hash

• CryptoLogica Team is developing its own public key encryption besides already developed symmetric key encryption and hash

Page 7: STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate.

7. CRYPTOLOGICA METHODS7. CRYPTOLOGICA METHODS

TYPEENCRYPTION METHOD KEY LENGTH [bits]

BLOCK[bits]SHORT LONG MIN MAX

Stream CLIS Ideal Stream (4) 256 4096 ∞

Stream CLOS Occult Stream 256 ∞ 128

Stream CLAS Advanced Stream 512 ∞ 256

Stream CLUS Ultimate Stream 384 ∞ 256

Stream CLES Extreme Stream 768 ∞ 256

Block CLOB Occult Block 256 ∞ 128

Block CLAB Advanced Block 512 ∞ 256

Block CLUB Ultimate Block 384 ∞ 256

Block CLEB Extreme Block 768 ∞ 256

Page 8: STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate.

8. SPEED @ SINGLE THREAD i7 2.2GHz8. SPEED @ SINGLE THREAD i7 2.2GHz

TYPE

NATIVE CLALGORITHM VS AES CTROPTIMIZED

KEYLENGTH

[bits]

BLOCKSIZE[bits]

ENC/DECSPEED[Gbit/s]

CL SPEEDAES SPEED

B AES CTR 256 128 1,401 1

S CLIS 4096 ∞ 6,752 4,819

S CLOS 4096 128 5,308 3,789

S CLAS 4096 256 6,663 4,756

S CLUS 4096 256 6,834 4,878

S CLES 4096 256 4,544 3,243

B CLOB 4096 128 5,263 3,757

B CLAB 4096 256 6,799 4,853

B CLUB 4096 256 6,594 4,707

B CLEB 4096 256 4,640 3,312

Page 9: STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate.

9. USER ADJUSTABLE PARAMETERS9. USER ADJUSTABLE PARAMETERSCryptoLogica solutions User parameters Size [bits]

Hybrid stream ciphers Key length 256..4,294,967,296Hybrid block ciphers Hash signature 256..4,294,967,2964 simple stream methods Hash length 256..65,5364 hybrid stream methods Stream offset 8, 16, 32 or 644 hybrid block methods Stream sum 8, 16, 32 or 648 hybrid hash methods Stream counter 8, 16, 32 or 64Zero encryption overhead Stream increment 8, 16, 32 or 64Identical ciphertext and plaintext bitrate

Block offset 8, 16, 32 or 64

Identical ciphertext and plaintext file size

Block rounds 8, 16, 32 or 64

Encryption speed almost independent on key length

Block counter 8, 16, 32 or 64

Hash speed almost independent on signature

Block Increment 8, 16, 32 or 64

Page 10: STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate.

10. NIST STS 2.1 RANDOMNESS TESTS10. NIST STS 2.1 RANDOMNESS TESTS• CRYPTOLOGICA methods passed all NIST STS 2.1 tests,

determining whether or not the sequence can be considered random, while being many times faster than AES. For example:

• CRYPTOLOGICA methods passed all NIST STS 2.1 tests, determining whether or not the sequence can be considered random, while being many times faster than AES. For example:

Linear Complexity

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

Speed Non-Optimized CL and Optimized AES CTR [Gbit/s]

0

1

2

3

4

5

6

7

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

• CRYPTOLOGICA methods solved all security, method, technical and practical problems in symmetric key encryption and hash authentication and verification, both now and in the future!

• CRYPTOLOGICA methods solved all security, method, technical and practical problems in symmetric key encryption and hash authentication and verification, both now and in the future!

Page 11: STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and Hash Future proof due to both ultimate.

WORLDWIDE REPRESENTATIVEWORLDWIDE REPRESENTATIVE

• Prof. dr. Milan Prokin

• +381-11-3016-595, +381-11-3016-596

• +1-310-880-9030, +381-64-4557-702

[email protected], [email protected]

• Prof. dr. Milan Prokin

• +381-11-3016-595, +381-11-3016-596

• +1-310-880-9030, +381-64-4557-702

[email protected], [email protected]

• Michael Collins

• +1-410-326-3001

• +1-410-320-7906

[email protected]

• Michael Collins

• +1-410-326-3001

• +1-410-320-7906

[email protected]

U.S. REPRESENTATIVEU.S. REPRESENTATIVE