STRATEGIC ENCRYPTION . 2. SECURITY PROBLEMS & SOLUTION Features of CryptoLogica Encryption and...

Preview:

Citation preview

STRATEGIC ENCRYPTIONSTRATEGIC ENCRYPTION

www.crypto-logica.comwww.crypto-logica.com

2. SECURITY PROBLEMS & SOLUTION2. SECURITY PROBLEMS & SOLUTION

Features of CryptoLogica Encryption and Hash

Future proof due to both ultimate security and ultimate speed

Unlimited key length (chosen by hardware/software embodiment)

Unlimited hash length (chosen by hardware/software embodiment)

Secure against faster computers due to longer keys

Brutal force security due to longer keys

Linear cryptanalysis security due to non-polynomial key finding

Differential cryptanalysis security without weak keys

Easily provable security due to simple algorithms

Security beyond just key length due to user adjustable parameters

Side-channel attack security due to lack of S-boxes, etc.

3. METHOD PROBLEMS & SOLUTION3. METHOD PROBLEMS & SOLUTION

Features of CryptoLogica Encryption and Hash

Non-polynomial key finding problem against cryptanalysis

No matrix operations for simple hardware/software embodiments

No vector operations for simple hardware/software embodiments

No substitution (S) boxes for preventing side-channel attack

Simple non-linear arithmetic for simple embodiments

Simple design without a “trap door” preventing key finding

Family of algorithms for further development and customization

Unpublished algorithms for maximum top security

Customizable algorithms for government security

User adjustable parameters for mission-critical security

4. TECHNICAL PROBLEMS & SOLUTION4. TECHNICAL PROBLEMS & SOLUTION

Features of Cryptologica Encryption and Hash

Highest encryption speed (several Gbit/s) on a single CPU thread

Highest hashing speed (several Gbit/s) on a single CPU thread

Ultralow latency for easy plug-in into current and new designs

Small processing complexity for any hardware platform

Small memory size for immediate applications anywhere

Small memory bandwidth preventing memory bus bottleneck

Low power consumption for portable and unattended devices

Low heat dissipation for stealth and undercover operations

Small weight of platform hardware for portable and aerial devices

Small size of platform hardware for small devices

5. PRACTICAL PROBLEMS & SOLUTION5. PRACTICAL PROBLEMS & SOLUTION

Features of CryptoLogica Encryption and Hash

Low cost of platform hardware for massive deployment

Low cost of platform software for massive deployment

Runs on any platform for installation on already deployed assets

Simple and fast interfacing with top level applications

Huge bit confusion by stream and block ciphers

Huge bit diffusion by block ciphers

Almost perfect randomness by stream and block ciphers

Integer arithmetic running on any platform

No multiplication for fast execution on general purpose processors

No division for fast execution on general purpose processors

6. CRYPTOLOGICA SOLUTIONS6. CRYPTOLOGICA SOLUTIONS

• CryptoLogica Team is developing its own public key encryption besides already developed symmetric key encryption and hash

• CryptoLogica Team is developing its own public key encryption besides already developed symmetric key encryption and hash

7. CRYPTOLOGICA METHODS7. CRYPTOLOGICA METHODS

TYPEENCRYPTION METHOD KEY LENGTH [bits]

BLOCK[bits]SHORT LONG MIN MAX

Stream CLIS Ideal Stream (4) 256 4096 ∞

Stream CLOS Occult Stream 256 ∞ 128

Stream CLAS Advanced Stream 512 ∞ 256

Stream CLUS Ultimate Stream 384 ∞ 256

Stream CLES Extreme Stream 768 ∞ 256

Block CLOB Occult Block 256 ∞ 128

Block CLAB Advanced Block 512 ∞ 256

Block CLUB Ultimate Block 384 ∞ 256

Block CLEB Extreme Block 768 ∞ 256

8. SPEED @ SINGLE THREAD i7 2.2GHz8. SPEED @ SINGLE THREAD i7 2.2GHz

TYPE

NATIVE CLALGORITHM VS AES CTROPTIMIZED

KEYLENGTH

[bits]

BLOCKSIZE[bits]

ENC/DECSPEED[Gbit/s]

CL SPEEDAES SPEED

B AES CTR 256 128 1,401 1

S CLIS 4096 ∞ 6,752 4,819

S CLOS 4096 128 5,308 3,789

S CLAS 4096 256 6,663 4,756

S CLUS 4096 256 6,834 4,878

S CLES 4096 256 4,544 3,243

B CLOB 4096 128 5,263 3,757

B CLAB 4096 256 6,799 4,853

B CLUB 4096 256 6,594 4,707

B CLEB 4096 256 4,640 3,312

9. USER ADJUSTABLE PARAMETERS9. USER ADJUSTABLE PARAMETERSCryptoLogica solutions User parameters Size [bits]

Hybrid stream ciphers Key length 256..4,294,967,296Hybrid block ciphers Hash signature 256..4,294,967,2964 simple stream methods Hash length 256..65,5364 hybrid stream methods Stream offset 8, 16, 32 or 644 hybrid block methods Stream sum 8, 16, 32 or 648 hybrid hash methods Stream counter 8, 16, 32 or 64Zero encryption overhead Stream increment 8, 16, 32 or 64Identical ciphertext and plaintext bitrate

Block offset 8, 16, 32 or 64

Identical ciphertext and plaintext file size

Block rounds 8, 16, 32 or 64

Encryption speed almost independent on key length

Block counter 8, 16, 32 or 64

Hash speed almost independent on signature

Block Increment 8, 16, 32 or 64

10. NIST STS 2.1 RANDOMNESS TESTS10. NIST STS 2.1 RANDOMNESS TESTS• CRYPTOLOGICA methods passed all NIST STS 2.1 tests,

determining whether or not the sequence can be considered random, while being many times faster than AES. For example:

• CRYPTOLOGICA methods passed all NIST STS 2.1 tests, determining whether or not the sequence can be considered random, while being many times faster than AES. For example:

Linear Complexity

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

Speed Non-Optimized CL and Optimized AES CTR [Gbit/s]

0

1

2

3

4

5

6

7

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

• CRYPTOLOGICA methods solved all security, method, technical and practical problems in symmetric key encryption and hash authentication and verification, both now and in the future!

• CRYPTOLOGICA methods solved all security, method, technical and practical problems in symmetric key encryption and hash authentication and verification, both now and in the future!

WORLDWIDE REPRESENTATIVEWORLDWIDE REPRESENTATIVE

• Prof. dr. Milan Prokin

• +381-11-3016-595, +381-11-3016-596

• +1-310-880-9030, +381-64-4557-702

• proka@el.etf.rs, milan.prokin@gmail.com

• Prof. dr. Milan Prokin

• +381-11-3016-595, +381-11-3016-596

• +1-310-880-9030, +381-64-4557-702

• proka@el.etf.rs, milan.prokin@gmail.com

• Michael Collins

• +1-410-326-3001

• +1-410-320-7906

• mc@ciffbe.com

• Michael Collins

• +1-410-326-3001

• +1-410-320-7906

• mc@ciffbe.com

U.S. REPRESENTATIVEU.S. REPRESENTATIVE

Recommended