Abstracts of Clape Technologieswww.clape.io
Asansol Astha IT Projects (P) Ltd. is an well-established, result-oriented IT Solutions Company.We are highly client-orien...
Abstract of the Patent Application for Symmetric KeyEncryption StandardThe present invention relates to a system and a met...
What the Company does:-•Our Company has conceived a Symmetric Key Encryption Standardand has filed for patenting in Indian...
TechnologyEvery block cipher involves a transformation of a block ofplain text into block of cipher text, where the transf...
Technology•Block size: with a view to improve security the block sizehas been increased but without any compromise to thes...
CLAPE CIPHER DESIGN PRINCIPLES :It encrypts 1024 bit blocks of plain text with the Cipher Key having same sizeof bits, usi...
Recent attacks on existing workhorse algorithmshttp://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show-ma...
In this context if the world is to have a securereliable and easily available encryptionalgorithm by the turn of the decad...
Performance Comparison Study:This comparison has been conducted to measureencryption / decryption speed of Clape withother...
THIS STUDY EVALUATES SEVEN DIFFERENTENCRYPTION ALGORITHMS NAMELY;AES, DES, 3DES, RC6, BLOWFISH, RC2 & CLAPE.THE PERFORMANC...
 Hardware used: i3 processor 2.10 GHz, 3GBRAM and i3 processor, 2.20 GHz, 2GB RAM Energy consumption : It is observed th...
Time Comparison of encryption algorithmsResults are based on base 64 encoding
Decryption Time (in milliseconds)Results are based on base 64 encoding
Encryption Time (in milliseconds) for Medium Size of fileResults are based on base 64 encoding
Decryption Time (in milliseconds) for Medium Size of fileResults are based on base 64 encoding
Encryption Time (in milliseconds)Results are based on base 64 encoding
Decryption Time (in milliseconds)Results are based on base 64 encoding
Graph showing time consumption for encryption with differentkey sizes for a specific size of File (7.14MB).Results are bas...
Graph showing time consumption for decryption with differentkey sizes for a specific size of File (7.14MB).Results are bas...
Graph showing time consumption for encryption with differentkey sizes for a specific size of File (694 Kb)Results are base...
Graph showing time consumption for decryption with different keysizes for a specific size of File (694 Kb)Results are base...
Acknowledgement:-International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010}International Business Inf...
Upcoming SlideShare
Loading in …5
×

Encryption symmetric key

624 views

Published on

Product of Clape Technologies Ltd.

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
624
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Encryption symmetric key

  1. 1. Abstracts of Clape Technologieswww.clape.io
  2. 2. Asansol Astha IT Projects (P) Ltd. is an well-established, result-oriented IT Solutions Company.We are highly client-oriented and quality-consciousand our portfolio basket includes a wide range ofservices and solutions in the area of Data Security &Business Applications.Clape Technologies Ltd (A sister organization ofAsansol Astha IT Projects (P) Ltd.) is working uponthe patent pending symmetric key encryptionstandard and the Abstract of the patent application isdetailed below.Asansol Astha IT Projects (P) Ltd.
  3. 3. Abstract of the Patent Application for Symmetric KeyEncryption StandardThe present invention relates to a system and a method forsecured transmission of data. The method comprises thesteps of providing the data, generating a password or a keyby a user, encrypting the data by the password or the key forplural number of times resulting plurality of ciphertexts, sending plurality of the cipher texts and the passwordor key, and decrypting the cipher text by the password or thekey. The system comprises input device means for providingthe data, input device means for generating a password by auser, processor means encrypting the data by the passwordor key for plural number of times resulting plurality of ciphertexts, means for sending the plurality of cipher texts and thepassword and means for decrypting the cipher text by thepassword or key.
  4. 4. What the Company does:-•Our Company has conceived a Symmetric Key Encryption Standardand has filed for patenting in Indian Patent Office vide applicationno.0992/KOL/2011 dated. 26.07.2011 in Kolkata Patent Office Entitled as“A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEYCRYPTOGRAPHIC COMMUNICATIONS.” And was published in theIndian Patent Office Journal on 2nd December 2011. Moreover we haveapplied for patenting in USPTO vide application no 13/557112 date24.07.2012 and was published in USPTO Journal on 31.12.2012•The Company has also applied for a Asymmetric Key cryptographicStandard and has filed for patenting in Indian Patent Office (I.P.OKolkata ) vide application no.446/KOL/2012 dated. 19/04/2012 inKolkata Patent Office Entitled as “METHOD FOR ESTABLISHINGSECURE COMMUNICATION IN A NETWORK AND SYSTEMTHEREOF” And was published in the Indian Patent Office(IPO) Journalon 24/08/2012
  5. 5. TechnologyEvery block cipher involves a transformation of a block ofplain text into block of cipher text, where the transformationdepends on the cipher key. The mechanism of our encryptionprocedure seeks to make the statistical relationship betweenthe plain text and the cipher text as complex as possible toprevent attempts to derive the cipher key.The technology a basic building block, which encrypts /decrypts a fixed size block of data, however to use these inpractice, we usually need to handle arbitrary amount of data, which may be available in advance, (in which case a blockmode is appropriate).
  6. 6. Technology•Block size: with a view to improve security the block sizehas been increased but without any compromise to thespeed of the procedure.•Key Size: increasing size improves security, makesexhaustive key searching harder but without anycompromise with the speed of encryption / decryptionfunction.•Number of rounds: increasing number of rounds in ourtechnology shall improve security but without slowing theCipher Generation Procedure.
  7. 7. CLAPE CIPHER DESIGN PRINCIPLES :It encrypts 1024 bit blocks of plain text with the Cipher Key having same sizeof bits, using appropriate iterations of an elaborate combination of table lookup and bits rearrange.Through this procedure the password key is being made into a 1024 bit blocksize and correspondingly a chunk of plain text of same bit size are being putinto our own encryption algorithm to generate a chunk of cipher text.It is commonly believed that the strength of the Password much depends onthe method how the encryption algorithm is deployed.In practicality, it has been observed that the user doesnt always want to usepassword as long as needed for effective key generation.As such responsibility of securing the password of the user rests on theEncryption Technology.There is no need for using salts/pass phrases in this technology forstrengthening the password what any common user tends to apply to achieveutmost security.
  8. 8. Recent attacks on existing workhorse algorithmshttp://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show-mathematically-crackable-flaws-in-common-web-encryption/http://arstechnica.com/security/2013/02/lucky-thirteen-attack-snarfs-cookies-protected-by-ssl-encryption/http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/http://www.isg.rhul.ac.uk/~kp/padding.pdfThe Cryptographic community needs to provide the world with a newencryption standard.The few workhorse algorithms for the last few decades are nearing the endof their useful life cycle.Moreover the recent attacks as evident in the following links providedherein:-
  9. 9. In this context if the world is to have a securereliable and easily available encryptionalgorithm by the turn of the decade the worldneeds several candidate symmetric Keyencryption algorithms now. These algorithmshave to be subjected to years of public scrutinyand cryptanalysis. We are confident that ourencryption standard will survive this processand shall eventually become a new standard.Mission:-
  10. 10. Performance Comparison Study:This comparison has been conducted to measureencryption / decryption speed of Clape withother encryption algorithms like Blowfish, AES, DES, 3DES etc. at different settings foreach algorithm such as; different sizes of datablocks, different key sizes, encryption /decryption speed / power Consumption etc.
  11. 11. THIS STUDY EVALUATES SEVEN DIFFERENTENCRYPTION ALGORITHMS NAMELY;AES, DES, 3DES, RC6, BLOWFISH, RC2 & CLAPE.THE PERFORMANCE MEASURE OFENCRYPTION SCHEMES HAS BEENCONDUCTED IN TERMS OF CHANGING FILESIZE FOR THE SELECTED CRYPTOGRAPHICALGORITHMS.
  12. 12.  Hardware used: i3 processor 2.10 GHz, 3GBRAM and i3 processor, 2.20 GHz, 2GB RAM Energy consumption : It is observed that 600times of encryption of a 5 MB file utilizesonly 20% (approx) of the available Batterypower of the laptop. All the tests have been performed oncommonly known file formats.Specifications:
  13. 13. Time Comparison of encryption algorithmsResults are based on base 64 encoding
  14. 14. Decryption Time (in milliseconds)Results are based on base 64 encoding
  15. 15. Encryption Time (in milliseconds) for Medium Size of fileResults are based on base 64 encoding
  16. 16. Decryption Time (in milliseconds) for Medium Size of fileResults are based on base 64 encoding
  17. 17. Encryption Time (in milliseconds)Results are based on base 64 encoding
  18. 18. Decryption Time (in milliseconds)Results are based on base 64 encoding
  19. 19. Graph showing time consumption for encryption with differentkey sizes for a specific size of File (7.14MB).Results are based onbase 64 encoding
  20. 20. Graph showing time consumption for decryption with differentkey sizes for a specific size of File (7.14MB).Results are based onbase 64 encoding
  21. 21. Graph showing time consumption for encryption with differentkey sizes for a specific size of File (694 Kb)Results are based onbase 64 encoding
  22. 22. Graph showing time consumption for decryption with different keysizes for a specific size of File (694 Kb)Results are based onbase 64 encoding
  23. 23. Acknowledgement:-International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010}International Business Information Management Association (IBIMA).Looking forward to arranging a presentation to demonstrate the authenticity of our claimsthrough Remote Screen Sharing / visit to our lab /any other conceivable mode of testing.Websites:www.clape.iowww.asthaitsolutions.comContacts:+1 202 642 3323 (USA)+91 341 225 0077 (India)E-mail:info@asthaitsolutions.cominfo@clape.io

×