Symmetric key encryption new approach

89
To The World of Data Security With Encryption Technology ed on 1024bit symmetric key encryption stand New Approach

description

 

Transcript of Symmetric key encryption new approach

Page 1: Symmetric key encryption new approach

To The World of Data SecurityWith Encryption Technology

Based on 1024bit symmetric key encryption standard

New Approach

Page 2: Symmetric key encryption new approach

Today we‘ll talk about “Symmetric Key Encryption”differently than we are used to.

Page 3: Symmetric key encryption new approach

Today we‘ll talk about “Symmetric Key Encryption”differently than we are used to.

OK, Do I need

special Knowledge

for that?

Page 4: Symmetric key encryption new approach

No No…

Not at a

ll

Today we‘ll talk about “Symmetric Key Encryption”differently than we are used to.

OK, Do I need

special Knowledge

for that?

Page 5: Symmetric key encryption new approach

What we can tell

you about this

procedure...

Page 6: Symmetric key encryption new approach

It’s….

Page 7: Symmetric key encryption new approach

Unique

It’s….

Page 8: Symmetric key encryption new approach

Secured

It’s….

Page 9: Symmetric key encryption new approach

Real fast

It’s….

Page 10: Symmetric key encryption new approach

Easy to use

It’s….

Page 11: Symmetric key encryption new approach

...and when there is any critical information...

Page 12: Symmetric key encryption new approach

We're at your

finger tips…

http://www.clape.io/

http://www.asthaitsolutions.com/

Page 13: Symmetric key encryption new approach

Now it’s time to get a ride of our

“Symmetric Key Encryption Procedure”

Page 14: Symmetric key encryption new approach

Ready?

Page 15: Symmetric key encryption new approach

Let’s go…

Page 16: Symmetric key encryption new approach

Let’s go…

ONE thing we can

Deliver during the

journey

Page 17: Symmetric key encryption new approach

... it‘s this ...

Page 18: Symmetric key encryption new approach

Re-Consider The Technology

Which YOU are using

Right now

Page 19: Symmetric key encryption new approach

Let us Revise the History at a glance

Page 20: Symmetric key encryption new approach

• Originally developed by IBM in 1970s, later adopted by U.S. government in 1977

• Encryption of 64-bit plaintext using a 56-bit key

Page 21: Symmetric key encryption new approach

• Relatively inexpensive to implement in hardware and widely available

• Largest users: financial transactions, PIN code generation, etc.

Page 22: Symmetric key encryption new approach

We‘ll tell you about

3 things today.

Page 23: Symmetric key encryption new approach

Current Tends Our Message New approach

Page 24: Symmetric key encryption new approach

Current Tends

Page 25: Symmetric key encryption new approach

Using Block Ciphers

• Encrypt a group of plaintext as one block and produces a block of cipher text

Page 26: Symmetric key encryption new approach

Latest ParametersBlock size: minimum 128 bits, 256

Key size: 128, 192, 256 bits

Page 27: Symmetric key encryption new approach

Disadvantages:

• Slowness of encryption Error propagation

Page 28: Symmetric key encryption new approach

• Needs to be maintained

Disadvantages:

• Slowness of encryption Error propagation

Page 29: Symmetric key encryption new approach

• High costs

• Needs to be maintained

Disadvantages:

• Slowness of encryption Error propagation

Page 30: Symmetric key encryption new approach

• Compatibility• High costs

• Needs to be maintained

Disadvantages:

• Slowness of encryption Error propagation

Page 31: Symmetric key encryption new approach

• Time consuming for the computer

• Compatibility• High costs

• Needs to be maintained

Disadvantages:

• Slowness of encryption Error propagation

Page 32: Symmetric key encryption new approach

... Above all of those ...

Page 33: Symmetric key encryption new approach

Our Message is…

Page 34: Symmetric key encryption new approach

You may’ve to face

ATTACKS Like….

Page 36: Symmetric key encryption new approach

For over coming all the obstacles on the path

Page 37: Symmetric key encryption new approach

You must have to adopt…

Page 38: Symmetric key encryption new approach

Our new approach

Page 39: Symmetric key encryption new approach

Now it’s “SHOW TIME” for our New Approach….

Page 40: Symmetric key encryption new approach

And that is….

Now it’s “SHOW TIME” for our New Approach….

Page 41: Symmetric key encryption new approach

Our Innovation

Page 42: Symmetric key encryption new approach

Our Innovation

Our Technology

Page 43: Symmetric key encryption new approach

Our Innovation

Our Technology

Our cipher design principle

Page 44: Symmetric key encryption new approach

Our Innovation

Our Technology

…And Speed Comparison of our

Our cipher design principle

Encryption algorithms Technology

Page 45: Symmetric key encryption new approach

Our Innovation

Page 46: Symmetric key encryption new approach

Our Innovation

Based on our own patent We have invented a New 1024 bit Symmetric Key Encryption Standard Entitled as…

Page 47: Symmetric key encryption new approach

“A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC

COMMUNICATIONS.”

http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2011/pat_arch_122011/official_journal_02122011_part_i.pdf

htt p://ip india.n ic.in/ipr/patent/journal_archieve/journal_2012/pat_arch_082012/offi cial_ journal_24082012_part_ i.pdf

http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2012/pat_arch_082012/official_journal_24082012_part_i.pdf

htt p://appft .uspto.gov/netacgi/nph-Parser?Sect1=PTO 1& Sect2=H ITO FF& d=PG 01& p=1& u=% 2Fnetahtm l% 2FPTO % 2Fsrchnum .htm l& r=1& f=G & l=50& s1=% 2220130028419% 22.PG N R .& O S=D N /20130028419& RS=D N /20130028419

http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220130028419%22.PGNR.&OS=DN/20130028419&RS=DN/20130028419

Page 48: Symmetric key encryption new approach

Our TechnologyThe mechanism :

Page 49: Symmetric key encryption new approach

Our crypto procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key.

Our TechnologyThe mechanism :

Page 50: Symmetric key encryption new approach

Our crypto procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key.

Our TechnologyThe mechanism :

And Other than that…

Page 51: Symmetric key encryption new approach

•The technology a basic building block, which encrypts / decrypts a fixed size block of data.

Our Technology

Page 52: Symmetric key encryption new approach

•The technology a basic building block, which encrypts / decrypts a fixed size block of data.

Our Technology

•To use these in practice, we usually need to handle arbitrary amount of data

Page 53: Symmetric key encryption new approach

•The technology a basic building block, which encrypts / decrypts a fixed size block of data.

Our Technology

•To use these in practice, we usually need to handle arbitrary amount of data

•The data may be available in advance, (in which case a block mode is appropriate).

Page 54: Symmetric key encryption new approach

…Now you can say…

Page 55: Symmetric key encryption new approach

Unique

It’s Truly…

Page 56: Symmetric key encryption new approach

Our cipher design principle

Page 57: Symmetric key encryption new approach

Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.

Page 58: Symmetric key encryption new approach

Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.

•Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.

Page 59: Symmetric key encryption new approach

Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.

•Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.

•responsibility of securing the password/Cipher Key of the user rests on the Encryption Technology.

Page 60: Symmetric key encryption new approach

Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.

•Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.

•responsibility of securing the password/Cipher Key of the user rests on the Encryption Technology.

•There is no need for using salts/pass phrases in this technology for strengthening the password

Page 61: Symmetric key encryption new approach

So our cipher design

principle is..

Page 62: Symmetric key encryption new approach

So our cipher design

principle is..

Secured

Page 63: Symmetric key encryption new approach

Now it’s time to compare The Speed of our

Encryption algorithms Technology

Page 64: Symmetric key encryption new approach

Based on some scrutiny and cryptanalysis, We are confident that our encryption standard will survive this process and shall eventually become a new standard.

Page 65: Symmetric key encryption new approach

Based on some scrutiny and cryptanalysis, We are confident that our encryption standard will survive this process and shall eventually become a new standard.

Let see some examples….

Page 66: Symmetric key encryption new approach

Before we start, we’ve to

clarify some thing & that

is….

Page 67: Symmetric key encryption new approach

Specifications of Hardware components utilized to make the under mentioned speed

comparison test :

Page 68: Symmetric key encryption new approach

•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM

Specifications of Hardware components utilized to make the under mentioned speed

comparison test :

Page 69: Symmetric key encryption new approach

•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM

Specifications of Hardware components utilized to make the under mentioned speed

comparison test :

•Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.

Page 70: Symmetric key encryption new approach

•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM

Specifications of Hardware components utilized to make the under mentioned speed

comparison test :

•Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.

• All the tests have been performed on commonly known file formats

Page 71: Symmetric key encryption new approach

•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM

Specifications of Hardware components utilized to make the under mentioned speed

comparison test :

•Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.

• All the tests have been performed on commonly known file formats

•All the test reports are based on base 64 encoding.

Page 72: Symmetric key encryption new approach

Time Comparison of encryption algorithms

Page 73: Symmetric key encryption new approach

Decryption Time (in milliseconds)

Page 74: Symmetric key encryption new approach

Encryption Time (in milliseconds) for

Medium Sized files

Page 75: Symmetric key encryption new approach

Decryption Time (in milliseconds) for Medium

Sized files

Page 76: Symmetric key encryption new approach

Encryption Time (in milliseconds)

Page 77: Symmetric key encryption new approach

Decryption Time (in milliseconds)

Page 78: Symmetric key encryption new approach

Graph showing time consumption for encryption with different key sizes for a

specific size of File (7.14MB) on our technology.

Page 79: Symmetric key encryption new approach

Graph showing time consumption for decryption with different key sizes for a

specific size of File (7.14MB) on our technology.

Page 80: Symmetric key encryption new approach

Graph showing time consumption for encryption with different key sizes for a

specific size of File (694 Kb) on our technology.

Page 81: Symmetric key encryption new approach

Graph showing time consumption for decryption with different key sizes for a

specific size of File (694 Kb) on our technology.

Page 82: Symmetric key encryption new approach

So….

Page 83: Symmetric key encryption new approach

Real fast & Secured

It’s….

Page 84: Symmetric key encryption new approach

If you Consider its Compatibility

Page 85: Symmetric key encryption new approach

If you Consider its Compatibility

• It is compatible to XP, Vista, Windows 7, Linux & Mac (OSX). Platforms.

Page 86: Symmetric key encryption new approach

And obviously it’s….

Page 87: Symmetric key encryption new approach

Easy to use

And obviously it’s….

Page 88: Symmetric key encryption new approach

Now It’s right time to Re-Consider

The Technology

Which YOU

are using

Right now

Page 89: Symmetric key encryption new approach

Acknowledgement:- International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010} International Business Information Management Association (IBIMA).