SlideShare a Scribd company logo
1 of 23
Abstracts of Clape Technologies
www.clape.io
Asansol Astha IT Projects (P) Ltd. is an well-
established, result-oriented IT Solutions Company.
We are highly client-oriented and quality-conscious
and our portfolio basket includes a wide range of
services and solutions in the area of Data Security &
Business Applications.
Clape Technologies Ltd (A sister organization of
Asansol Astha IT Projects (P) Ltd.) is working upon
the patent pending symmetric key encryption
standard and the Abstract of the patent application is
detailed below.
Asansol Astha IT Projects (P) Ltd.
Abstract of the Patent Application for Symmetric Key
Encryption Standard
The present invention relates to a system and a method for
secured transmission of data. The method comprises the
steps of providing the data, generating a password or a key
by a user, encrypting the data by the password or the key for
plural number of times resulting plurality of cipher
texts, sending plurality of the cipher texts and the password
or key, and decrypting the cipher text by the password or the
key. The system comprises input device means for providing
the data, input device means for generating a password by a
user, processor means encrypting the data by the password
or key for plural number of times resulting plurality of cipher
texts, means for sending the plurality of cipher texts and the
password and means for decrypting the cipher text by the
password or key.
What the Company does:-
•Our Company has conceived a Symmetric Key Encryption Standard
and has filed for patenting in Indian Patent Office vide application
no.0992/KOL/2011 dated. 26.07.2011 in Kolkata Patent Office Entitled as
“A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY
CRYPTOGRAPHIC COMMUNICATIONS.” And was published in the
Indian Patent Office Journal on 2nd December 2011. Moreover we have
applied for patenting in USPTO vide application no 13/557112 date
24.07.2012 and was published in USPTO Journal on 31.12.2012
•The Company has also applied for a Asymmetric Key cryptographic
Standard and has filed for patenting in Indian Patent Office (I.P.O
Kolkata ) vide application no.446/KOL/2012 dated. 19/04/2012 in
Kolkata Patent Office Entitled as “METHOD FOR ESTABLISHING
SECURE COMMUNICATION IN A NETWORK AND SYSTEM
THEREOF” And was published in the Indian Patent Office(IPO) Journal
on 24/08/2012
Technology
Every block cipher involves a transformation of a block of
plain text into block of cipher text, where the transformation
depends on the cipher key. The mechanism of our encryption
procedure seeks to make the statistical relationship between
the plain text and the cipher text as complex as possible to
prevent attempts to derive the cipher key.
The technology a basic building block, which encrypts /
decrypts a fixed size block of data, however to use these in
practice, we usually need to handle arbitrary amount of data
, which may be available in advance, (in which case a block
mode is appropriate).
Technology
•Block size: with a view to improve security the block size
has been increased but without any compromise to the
speed of the procedure.
•Key Size: increasing size improves security, makes
exhaustive key searching harder but without any
compromise with the speed of encryption / decryption
function.
•Number of rounds: increasing number of rounds in our
technology shall improve security but without slowing the
Cipher Generation Procedure.
CLAPE CIPHER DESIGN PRINCIPLES :
It encrypts 1024 bit blocks of plain text with the Cipher Key having same size
of bits, using appropriate iterations of an elaborate combination of table look
up and bits rearrange.
Through this procedure the password key is being made into a 1024 bit block
size and correspondingly a chunk of plain text of same bit size are being put
into our own encryption algorithm to generate a chunk of cipher text.
It is commonly believed that the strength of the Password much depends on
the method how the encryption algorithm is deployed.
In practicality, it has been observed that the user doesn't always want to use
password as long as needed for effective key generation.
As such responsibility of securing the password of the user rests on the
Encryption Technology.
There is no need for using salts/pass phrases in this technology for
strengthening the password what any common user tends to apply to achieve
utmost security.
Recent attacks on existing workhorse algorithms
http://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show-
mathematically-crackable-flaws-in-common-web-encryption/
http://arstechnica.com/security/2013/02/lucky-thirteen-attack-snarfs-cookies-protected-
by-ssl-encryption/
http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
http://www.isg.rhul.ac.uk/~kp/padding.pdf
The Cryptographic community needs to provide the world with a new
encryption standard.
The few workhorse algorithms for the last few decades are nearing the end
of their useful life cycle.
Moreover the recent attacks as evident in the following links provided
herein:-
In this context if the world is to have a secure
reliable and easily available encryption
algorithm by the turn of the decade the world
needs several candidate symmetric Key
encryption algorithms now. These algorithms
have to be subjected to years of public scrutiny
and cryptanalysis. We are confident that our
encryption standard will survive this process
and shall eventually become a new standard.
Mission:-
Performance Comparison Study:
This comparison has been conducted to measure
encryption / decryption speed of Clape with
other encryption algorithms like Blow
fish, AES, DES, 3DES etc. at different settings for
each algorithm such as; different sizes of data
blocks, different key sizes, encryption /
decryption speed / power Consumption etc.
THIS STUDY EVALUATES SEVEN DIFFERENT
ENCRYPTION ALGORITHMS NAMELY;
AES, DES, 3DES, RC6, BLOWFISH, RC2 & CLAPE.
THE PERFORMANCE MEASURE OF
ENCRYPTION SCHEMES HAS BEEN
CONDUCTED IN TERMS OF CHANGING FILE
SIZE FOR THE SELECTED CRYPTOGRAPHIC
ALGORITHMS.
 Hardware used: i3 processor 2.10 GHz, 3GB
RAM and i3 processor, 2.20 GHz, 2GB RAM
 Energy consumption : It is observed that 600
times of encryption of a 5 MB file utilizes
only 20% (approx) of the available Battery
power of the laptop.
 All the tests have been performed on
commonly known file formats.
Specifications:
Time Comparison of encryption algorithms
Results are based on base 64 encoding
Decryption Time (in milliseconds)
Results are based on base 64 encoding
Encryption Time (in milliseconds) for Medium Size of file
Results are based on base 64 encoding
Decryption Time (in milliseconds) for Medium Size of file
Results are based on base 64 encoding
Encryption Time (in milliseconds)
Results are based on base 64 encoding
Decryption Time (in milliseconds)
Results are based on base 64 encoding
Graph showing time consumption for encryption with different
key sizes for a specific size of File (7.14MB).
Results are based on
base 64 encoding
Graph showing time consumption for decryption with different
key sizes for a specific size of File (7.14MB).
Results are based on
base 64 encoding
Graph showing time consumption for encryption with different
key sizes for a specific size of File (694 Kb)
Results are based on
base 64 encoding
Graph showing time consumption for decryption with different key
sizes for a specific size of File (694 Kb)
Results are based on
base 64 encoding
Acknowledgement:-
International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010}
International Business Information Management Association (IBIMA).
Looking forward to arranging a presentation to demonstrate the authenticity of our claims
through Remote Screen Sharing / visit to our lab /any other conceivable mode of testing.
Websites:
www.clape.io
www.asthaitsolutions.com
Contacts:
+1 202 642 3323 (USA)
+91 341 225 0077 (India)
E-mail:
info@asthaitsolutions.com
info@clape.io

More Related Content

What's hot

Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security PrimerVenkatesh Iyer
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacyPunnya Babu
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherGopal Sakarkar
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKIRabei Hassan
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164Thivya Devaraj
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...IRJET Journal
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptographyShivam Singh
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic toolsCAS
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption TechniquesDel Elson
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 

What's hot (20)

Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Pgp
PgpPgp
Pgp
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164
 
Ssl for e commerce
Ssl for  e commerceSsl for  e commerce
Ssl for e commerce
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
Ipsec
IpsecIpsec
Ipsec
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
Network security cs8
Network security  cs8Network security  cs8
Network security cs8
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Pgp1
Pgp1Pgp1
Pgp1
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption Techniques
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 

Similar to Encryption symmetric key

Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryptionmdhar123
 
Symmetric key encryption new approach
Symmetric key encryption new approachSymmetric key encryption new approach
Symmetric key encryption new approachmdhar123
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels PresentationRichard Blech
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaSusmitha Reddy
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Mukesh Chinta
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd Iaetsd
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computingijtsrd
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...IRJET Journal
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
Comparative analysis of algorithms
Comparative analysis of algorithmsComparative analysis of algorithms
Comparative analysis of algorithmsYisal Khan
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security IssuesEditor IJCATR
 

Similar to Encryption symmetric key (20)

Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
Symmetric key encryption new approach
Symmetric key encryption new approachSymmetric key encryption new approach
Symmetric key encryption new approach
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels Presentation
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
Comparative analysis of algorithms
Comparative analysis of algorithmsComparative analysis of algorithms
Comparative analysis of algorithms
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Encryption symmetric key

  • 1. Abstracts of Clape Technologies www.clape.io
  • 2. Asansol Astha IT Projects (P) Ltd. is an well- established, result-oriented IT Solutions Company. We are highly client-oriented and quality-conscious and our portfolio basket includes a wide range of services and solutions in the area of Data Security & Business Applications. Clape Technologies Ltd (A sister organization of Asansol Astha IT Projects (P) Ltd.) is working upon the patent pending symmetric key encryption standard and the Abstract of the patent application is detailed below. Asansol Astha IT Projects (P) Ltd.
  • 3. Abstract of the Patent Application for Symmetric Key Encryption Standard The present invention relates to a system and a method for secured transmission of data. The method comprises the steps of providing the data, generating a password or a key by a user, encrypting the data by the password or the key for plural number of times resulting plurality of cipher texts, sending plurality of the cipher texts and the password or key, and decrypting the cipher text by the password or the key. The system comprises input device means for providing the data, input device means for generating a password by a user, processor means encrypting the data by the password or key for plural number of times resulting plurality of cipher texts, means for sending the plurality of cipher texts and the password and means for decrypting the cipher text by the password or key.
  • 4. What the Company does:- •Our Company has conceived a Symmetric Key Encryption Standard and has filed for patenting in Indian Patent Office vide application no.0992/KOL/2011 dated. 26.07.2011 in Kolkata Patent Office Entitled as “A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC COMMUNICATIONS.” And was published in the Indian Patent Office Journal on 2nd December 2011. Moreover we have applied for patenting in USPTO vide application no 13/557112 date 24.07.2012 and was published in USPTO Journal on 31.12.2012 •The Company has also applied for a Asymmetric Key cryptographic Standard and has filed for patenting in Indian Patent Office (I.P.O Kolkata ) vide application no.446/KOL/2012 dated. 19/04/2012 in Kolkata Patent Office Entitled as “METHOD FOR ESTABLISHING SECURE COMMUNICATION IN A NETWORK AND SYSTEM THEREOF” And was published in the Indian Patent Office(IPO) Journal on 24/08/2012
  • 5. Technology Every block cipher involves a transformation of a block of plain text into block of cipher text, where the transformation depends on the cipher key. The mechanism of our encryption procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key. The technology a basic building block, which encrypts / decrypts a fixed size block of data, however to use these in practice, we usually need to handle arbitrary amount of data , which may be available in advance, (in which case a block mode is appropriate).
  • 6. Technology •Block size: with a view to improve security the block size has been increased but without any compromise to the speed of the procedure. •Key Size: increasing size improves security, makes exhaustive key searching harder but without any compromise with the speed of encryption / decryption function. •Number of rounds: increasing number of rounds in our technology shall improve security but without slowing the Cipher Generation Procedure.
  • 7. CLAPE CIPHER DESIGN PRINCIPLES : It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations of an elaborate combination of table look up and bits rearrange. Through this procedure the password key is being made into a 1024 bit block size and correspondingly a chunk of plain text of same bit size are being put into our own encryption algorithm to generate a chunk of cipher text. It is commonly believed that the strength of the Password much depends on the method how the encryption algorithm is deployed. In practicality, it has been observed that the user doesn't always want to use password as long as needed for effective key generation. As such responsibility of securing the password of the user rests on the Encryption Technology. There is no need for using salts/pass phrases in this technology for strengthening the password what any common user tends to apply to achieve utmost security.
  • 8. Recent attacks on existing workhorse algorithms http://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show- mathematically-crackable-flaws-in-common-web-encryption/ http://arstechnica.com/security/2013/02/lucky-thirteen-attack-snarfs-cookies-protected- by-ssl-encryption/ http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/ http://www.isg.rhul.ac.uk/~kp/padding.pdf The Cryptographic community needs to provide the world with a new encryption standard. The few workhorse algorithms for the last few decades are nearing the end of their useful life cycle. Moreover the recent attacks as evident in the following links provided herein:-
  • 9. In this context if the world is to have a secure reliable and easily available encryption algorithm by the turn of the decade the world needs several candidate symmetric Key encryption algorithms now. These algorithms have to be subjected to years of public scrutiny and cryptanalysis. We are confident that our encryption standard will survive this process and shall eventually become a new standard. Mission:-
  • 10. Performance Comparison Study: This comparison has been conducted to measure encryption / decryption speed of Clape with other encryption algorithms like Blow fish, AES, DES, 3DES etc. at different settings for each algorithm such as; different sizes of data blocks, different key sizes, encryption / decryption speed / power Consumption etc.
  • 11. THIS STUDY EVALUATES SEVEN DIFFERENT ENCRYPTION ALGORITHMS NAMELY; AES, DES, 3DES, RC6, BLOWFISH, RC2 & CLAPE. THE PERFORMANCE MEASURE OF ENCRYPTION SCHEMES HAS BEEN CONDUCTED IN TERMS OF CHANGING FILE SIZE FOR THE SELECTED CRYPTOGRAPHIC ALGORITHMS.
  • 12.  Hardware used: i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM  Energy consumption : It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.  All the tests have been performed on commonly known file formats. Specifications:
  • 13. Time Comparison of encryption algorithms Results are based on base 64 encoding
  • 14. Decryption Time (in milliseconds) Results are based on base 64 encoding
  • 15. Encryption Time (in milliseconds) for Medium Size of file Results are based on base 64 encoding
  • 16. Decryption Time (in milliseconds) for Medium Size of file Results are based on base 64 encoding
  • 17. Encryption Time (in milliseconds) Results are based on base 64 encoding
  • 18. Decryption Time (in milliseconds) Results are based on base 64 encoding
  • 19. Graph showing time consumption for encryption with different key sizes for a specific size of File (7.14MB). Results are based on base 64 encoding
  • 20. Graph showing time consumption for decryption with different key sizes for a specific size of File (7.14MB). Results are based on base 64 encoding
  • 21. Graph showing time consumption for encryption with different key sizes for a specific size of File (694 Kb) Results are based on base 64 encoding
  • 22. Graph showing time consumption for decryption with different key sizes for a specific size of File (694 Kb) Results are based on base 64 encoding
  • 23. Acknowledgement:- International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010} International Business Information Management Association (IBIMA). Looking forward to arranging a presentation to demonstrate the authenticity of our claims through Remote Screen Sharing / visit to our lab /any other conceivable mode of testing. Websites: www.clape.io www.asthaitsolutions.com Contacts: +1 202 642 3323 (USA) +91 341 225 0077 (India) E-mail: info@asthaitsolutions.com info@clape.io