Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Symmetric key encryption new approach

521 views

Published on

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

Symmetric key encryption new approach

  1. 1. To The World of Data SecurityWith Encryption TechnologyBased on 1024bit symmetric key encryption standardNew Approach
  2. 2. Today we„ll talkabout “Symmetric KeyEncryption”differently than weare used to.
  3. 3. Today we„ll talkabout “Symmetric KeyEncryption”differently than weare used to.OK, Do I needspecial Knowledgefor that?
  4. 4. Today we„ll talkabout “Symmetric KeyEncryption”differently than weare used to.OK, Do I needspecial Knowledgefor that?
  5. 5. What we can tellyou about thisprocedure...
  6. 6. It‟s….
  7. 7. UniqueIt‟s….
  8. 8. SecuredIt‟s….
  9. 9. Real fastIt‟s….
  10. 10. Easy to useIt‟s….
  11. 11. ...and when there is anycritical information...
  12. 12. Were at yourfinger tips…http://www.clape.io/http://www.asthaitsolutions.com/
  13. 13. Now it’s time to get a rideof our“Symmetric KeyEncryption Procedure”
  14. 14. Ready?
  15. 15. Let‟s go…
  16. 16. Let‟s go…
  17. 17. ... it„s this ...
  18. 18. Re-ConsiderThe TechnologyWhich YOU are usingRight now
  19. 19. Let us Revise the Historyat a glance
  20. 20. • Originally developed by IBM in1970s, later adopted by U.S.government in 1977• Encryption of 64-bit plaintext usinga 56-bit key
  21. 21. • Relatively inexpensive toimplement in hardware andwidely available• Largest users: financialtransactions, PIN codegeneration, etc.
  22. 22. We„ll tell you about3 things today.
  23. 23. Current Tends Our Message New approach
  24. 24. CurrentTends
  25. 25. Using Block Ciphers• Encrypt a group of plaintext asone block and produces a blockof cipher text
  26. 26. Latest ParametersBlock size: minimum 128 bits, 256Key size: 128, 192, 256 bits
  27. 27. Disadvantages:• Slowness of encryption Errorpropagation
  28. 28. • Needs to be maintainedDisadvantages:• Slowness of encryption Errorpropagation
  29. 29. • High costs• Needs to be maintainedDisadvantages:• Slowness of encryption Errorpropagation
  30. 30. • Compatibility• High costs• Needs to be maintainedDisadvantages:• Slowness of encryption Errorpropagation
  31. 31. • Time consuming for the computer• Compatibility• High costs• Needs to be maintainedDisadvantages:• Slowness of encryption Errorpropagation
  32. 32. ... Above all of those ...
  33. 33. OurMessageis…
  34. 34. You may‟ve to faceATTACKS Like….
  35. 35. …Recent attacks on existingworkhorse algorithmshttp://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show-mathematically-crackable-flaws-in-common-web-encryption/http://arstechnica.com/security/2013/02/lucky-thirteen-attack-snarfs-cookies-protected-by-ssl-encryption/http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/http://www.isg.rhul.ac.uk/~kp/padding.pdfhttp://www.pcworld.com/article/2036563/livingsocials-breach-draws-advice-from-security-experts.html/
  36. 36. For over coming all theobstacles on the path
  37. 37. You must have toadopt…
  38. 38. Our newapproach
  39. 39. Now it‟s “SHOW TIME” forour New Approach….
  40. 40. And that is….Now it‟s “SHOW TIME” forour New Approach….
  41. 41. Our Innovation
  42. 42. Our InnovationOur Technology
  43. 43. Our InnovationOur TechnologyOur cipher design principle
  44. 44. Our InnovationOur Technology…And Speed Comparison of ourOur cipher design principleEncryption algorithms Technology
  45. 45. Our Innovation
  46. 46. Our InnovationBased on our own patent We have invented aNew 1024 bit Symmetric Key EncryptionStandard Entitled as…
  47. 47. “A SYSTEM AND A METHOD FOR USE IN ASYMMETRIC KEY CRYPTOGRAPHICCOMMUNICATIONS.”http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2011/pat_arch_122011/official_journal_02122011_part_i.pdfhttp://ipindia.nic.in/ipr/patent/journal_archieve/journal_2012/pat_arch_082012/official_journal_24082012_part_i.pdfhttp://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220130028419%22.PGNR.&OS=DN/20130028419&RS=DN/20130028419
  48. 48. Our TechnologyThe mechanism :
  49. 49. Our crypto procedure seeks to make thestatistical relationship between the plain textand the cipher text as complex as possible toprevent attempts to derive the cipher key.Our TechnologyThe mechanism :
  50. 50. Our crypto procedure seeks to make thestatistical relationship between the plain textand the cipher text as complex as possible toprevent attempts to derive the cipher key.Our TechnologyThe mechanism :And Other than that…
  51. 51. •The technology a basic building block, whichencrypts / decrypts a fixed size block of data.Our Technology
  52. 52. •The technology a basic building block, whichencrypts / decrypts a fixed size block of data.Our Technology•To use these in practice, we usually need to handlearbitrary amount of data
  53. 53. •The technology a basic building block, whichencrypts / decrypts a fixed size block of data.Our Technology•To use these in practice, we usually need to handlearbitrary amount of data•The data may be available in advance, (in whichcase a block mode is appropriate).
  54. 54. …Now you can say…
  55. 55. UniqueIt’sTruly…
  56. 56. Our cipher design principle
  57. 57. Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Keyhaving same size of bits, using appropriate iterations.
  58. 58. Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Keyhaving same size of bits, using appropriate iterations.•Through this procedure the password key is being made intoa 1024 bit block size and put into our own encryptionalgorithm to generate a chunk of cipher text of same bit size.
  59. 59. Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Keyhaving same size of bits, using appropriate iterations.•Through this procedure the password key is being made intoa 1024 bit block size and put into our own encryptionalgorithm to generate a chunk of cipher text of same bit size.•responsibility of securing the password/Cipher Key of theuser rests on the Encryption Technology.
  60. 60. Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Keyhaving same size of bits, using appropriate iterations.•Through this procedure the password key is being made intoa 1024 bit block size and put into our own encryptionalgorithm to generate a chunk of cipher text of same bit size.•responsibility of securing the password/Cipher Key of theuser rests on the Encryption Technology.•There is no need for using salts/pass phrases in thistechnology for strengthening the password
  61. 61. So our cipher designprinciple is..
  62. 62. So our cipher designprinciple is..Secured
  63. 63. Now it’s time to compareThe Speed of ourEncryption algorithmsTechnology
  64. 64. Based on some scrutiny and cryptanalysis,We are confident that our encryptionstandard will survive this process and shalleventually become a new standard.
  65. 65. Based on some scrutiny and cryptanalysis,We are confident that our encryptionstandard will survive this process and shalleventually become a new standard.Let see some examples….
  66. 66. Before we start, we‟ve toclarify some thing & thatis….
  67. 67. Specifications of Hardware componentsutilized to make the under mentioned speedcomparison test :
  68. 68. •i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GBRAMSpecifications of Hardware componentsutilized to make the under mentioned speedcomparison test :
  69. 69. •i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GBRAMSpecifications of Hardware componentsutilized to make the under mentioned speedcomparison test :•Energy consumption: It is observed that 600 times of encryptionof a 5 MB file utilizes only 20% (approx) of the available Batterypower of the laptop.
  70. 70. •i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GBRAMSpecifications of Hardware componentsutilized to make the under mentioned speedcomparison test :•Energy consumption: It is observed that 600 times of encryptionof a 5 MB file utilizes only 20% (approx) of the available Batterypower of the laptop.• All the tests have been performed on commonly known fileformats
  71. 71. •i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GBRAMSpecifications of Hardware componentsutilized to make the under mentioned speedcomparison test :•Energy consumption: It is observed that 600 times of encryptionof a 5 MB file utilizes only 20% (approx) of the available Batterypower of the laptop.• All the tests have been performed on commonly known fileformats•All the test reports are based on base 64 encoding.
  72. 72. Time Comparison of encryptionalgorithms
  73. 73. Decryption Time (in milliseconds)
  74. 74. Encryption Time(in milliseconds) for MediumSized files
  75. 75. Decryption Time (in milliseconds)for Medium Sized files
  76. 76. Encryption Time(in milliseconds)
  77. 77. Decryption Time(in milliseconds)
  78. 78. Graph showing time consumption for encryptionwith different key sizes for a specific size of File(7.14MB) on our technology.
  79. 79. Graph showing time consumption for decryptionwith different key sizes for a specific size of File(7.14MB) on our technology.
  80. 80. Graph showing time consumption for encryptionwith different key sizes for a specific size of File(694 Kb) on our technology.
  81. 81. Graph showing time consumption for decryptionwith different key sizes for a specific size of File (694Kb) on our technology.
  82. 82. So….
  83. 83. Real fast & SecuredIt‟s….
  84. 84. If you Consider its Compatibility
  85. 85. If you Consider its Compatibility• It is compatible to XP, Vista, Windows 7,Linux & Mac (OSX). Platforms.
  86. 86. And obviously it‟s….
  87. 87. Easy to useAnd obviously it‟s….
  88. 88. Now It‟s right time toRe-ConsiderThe TechnologyWhich YOUare usingRight now
  89. 89. Acknowledgement:-International Journal of Network Security, Vol.10, No.3, PP.213 {219,May 2010}International Business Information Management Association (IBIMA).

×