CRYPTOLOGICA8MB.ppt - PowerPoint PPT Presentation

About This Presentation
Title:

CRYPTOLOGICA8MB.ppt

Description:

... IPTV Cable TV Satellite ... HDMI NODE Wireless HDMI IEEE802.11g/n Wired HDMI 10/100/1000 Base-T Transmitter at HDMI out port Receiver ... CRYPTOLOGICA8MB.ppt ... – PowerPoint PPT presentation

Number of Views:106
Avg rating:3.0/5.0
Slides: 55
Provided by: Dr231115
Category:

less

Transcript and Presenter's Notes

Title: CRYPTOLOGICA8MB.ppt


1
STRATEGIC ENCRYPTION
www.crypto-logica.com
2
2. TECHNOLOGY FEATURES
  • Future proof available today
  • Encryption with ANY key length
  • Authentication with ANY hash length
  • Brutal force security
  • Secure against computing developments
  • Any cryptanalysis security
  • Linear cryptanalysis security
  • Differential cryptanalysis security
  • No backdoor for decryption without a key

3
3. ANY KEY LENGTH
4
4. ALGORITHM FEATURES
  • Non-polynomial (NP) key finding problem
  • Key lengths chosen for NP problem
  • No matrix operations
  • No vector operations
  • No S-boxes
  • Simple non-linear arithmetic operations
  • Huge bit diffusion
  • Huge bit confusion
  • Perfect randomness

5
5. DEVELOPED TECHNOLOGY
  • 4 simple stream methods
  • 4 hybrid symmetric stream methods
  • 4 hybrid symmetric block methods
  • 8 hybrid hash methods
  • Zero encryption overhead
  • Identical ciphertext and plaintext bitrate
  • Identical ciphertext and plaintext file size
  • Key length from 256 to 4.294.967.296 bits
  • Speed almost independent on key length

6
6. DEVELOPED ENCRYPTION METHODS
TYPE ENCRYPTION METHOD ENCRYPTION METHOD KEY LENGTH bits KEY LENGTH bits BLOCK bits
TYPE SHORT LONG MIN MAX BLOCK bits
Stream CLIS Ideal Stream (4) 256 4096 8
Stream CLOS Occult Stream 256 8 128
Stream CLAS Advanced Stream 512 8 256
Stream CLUS Ultimate Stream 384 8 256
Stream CLES Extreme Stream 768 8 256
Block CLOB Occult Block 256 8 128
Block CLAB Advanced Block 512 8 256
Block CLUB Ultimate Block 384 8 256
Block CLEB Extreme Block 768 8 256
7
7. ENCRYPTION METHODS
8
8. TYPE DIFFERENCE
  • All stream ciphers except CLIS are hybrid
    (streamblock) symmetric stream ciphers, wherein
    the position of each bit in plaintext input
    stream or file remains intact in ciphertext
    output stream or file
  • All block ciphers are hybrid (streamblock)
    symmetric block ciphers, wherein the position of
    each bit in plaintext input stream or file is
    diffused within 256 or 128 bit block in
    ciphertext output stream or file

9
9. ALGORITHM CUSTOMIZATION
  • Family of customized algorithms
  • Algorithms have adjustable parameters
  • User can change algorithm parameters
  • Enormous increase of number of methods
  • Additional customized algorithm security
  • Unknown algorithm for unauthorized
  • Private algorithm provides open solution
  • No extraction of customized parameters by anyone
    including Crypto Logica Team

10
10. SOFTWARE METHODS
11
11. CIPHER PARAMETERS
  • Stream Offset
  • Stream Sum
  • Stream Counter
  • Stream Increment
  • Parameters width depends on internal data
  • 8 x 8-bit (64-bit total) for 8-bit data
  • 8 x 16 bit (128-bits total) for 16-bit data
  • 8 x 32 bit (256-bits total) for 32-bit data
  • 8 x 64 bit (512-bits total) for 64-bit data
  • Block Offset
  • Block Rounds
  • Block Counter
  • Block Increment

12
12. HASH PARAMETERS
  • Stream Offset
  • Stream Sum
  • Stream Counter
  • Stream Increment
  • Hash Length
  • Hash Length is completely freely chosen
  • Hash Length can be any number
  • Hash Signature is completely freely chosen
  • Hash Signature can be any number
  • Block Offset
  • Block Rounds
  • Block Counter
  • Block Increment
  • Hash Signature

13
13. OPTIONAL KEY GENERATION
  • User password with at least 16-characters
  • 1-bit difference in two passwords provides two
    completely different uncorrelated keys
  • Key is not stored in any peripheral memory media
    in any form
  • Lost password prevents decryption
  • Any secure public key cryptography can be used
    for key exchange
  • Crypto Logica Team is developing its own fast
    public key cryptography

14
14. SPEED, LATENCY, POWER, COST
  • Faster encryption than AES
  • Smaller encrypter latency
  • Encrypter power savings
  • Smaller encrypter cost
  • Faster decryption than AES
  • Smaller decrypter latency
  • Decrypter power savings
  • Smaller decrypter cost
  • Maximum processor efficiency

15
15. CRYPTOLOGICA DEMO SOFTWARE
16
16. SPEED _at_ SINGLE THREAD i7 2.2GHz
T Y P E NATIVE CL ALGORITHM VS AES CTR OPTIMIZED KEY LENGTH bits BLOCK SIZE bits ENC/DEC SPEED Gbit/s CL SPEED AES SPEED
B AES CTR 256 128 1,401 1
S CLIS 4096 8 6,752 4,819
S CLOS 4096 128 5,308 3,789
S CLAS 4096 256 6,663 4,756
S CLUS 4096 256 6,834 4,878
S CLES 4096 256 4,544 3,243
B CLOB 4096 128 5,263 3,757
B CLAB 4096 256 6,799 4,853
B CLUB 4096 256 6,594 4,707
B CLEB 4096 256 4,640 3,312
17
17. ENCRYPTION/DECRYPTION SPEED
18
18. CL SPEED / AES SPEED
  • AES AES CTR in all diagrams
  • Plaintext All 0s (worst case)
  • Key All 0s (worst case)

19
19. NIST STS 2.1 RANDOMNESS TESTS
  • Frequency Test within a Block determines whether
    the frequency of ones in an M-bit block is
    approximately M/2.

20
20. NIST STS 2.1 RANDOMNESS TESTS
  • Frequency Test within a Block determines whether
    the frequency of ones in an M-bit block is
    approximately M/2.

21
21. NIST STS 2.1 RANDOMNESS TESTS
  • Cumulative Sums (Cusum-Forward) Test determines
    whether the cumulative sum of the partial
    sequences occurring in the tested sequence is too
    large or too small.

22
22. NIST STS 2.1 RANDOMNESS TESTS
  • Cumulative Sums (Cusum-Reverse) Test determines
    whether the cumulative sum of the partial
    sequences occurring in the tested sequence is too
    large or too small.

23
23. NIST STS 2.1 RANDOMNESS TESTS
  • Runs Test determines whether the number of runs
    (uninterrupted sequence of identical bits) of
    ones and zeros of various lengths is as expected
    for a random seq.

24
24. NIST STS 2.1 RANDOMNESS TESTS
  • Test for the Longest Run of Ones in a Block
    determines whether the length of the longest run
    of ones is consistent with the expected length.

25
25. NIST STS 2.1 RANDOMNESS TESTS
  • Binary Matrix Rank Test determines the linear
    dependence among fixed length substrings of the
    original sequence.

26
26. NIST STS 2.1 RANDOMNESS TESTS
  • Discrete Fourier Transform (Spectral) Test
    detects periodic features (i.e. repetitive
    patterns that are near each other).

27
27. NIST STS 2.1 RANDOMNESS TESTS
  • Non-overlapping Template Matching Test detects
    too many occurences of a given non-periodic
    (aperiodic) pattern.

28
28. NIST STS 2.1 RANDOMNESS TESTS
  • Overlapping Template Matching Test determines the
    number of occurrences of pre-specified target
    strings.

29
29. NIST STS 2.1 RANDOMNESS TESTS
  • Mauers Universal Statistical Test detects
    whether or not the sequence can be significantly
    compressed without loss of information.

30
30. NIST STS 2.1 RANDOMNESS TESTS
  • Approximate Entropy Test compares the frequency
    of all possible overlapping m-bit patterns across
    the entire sequence.

31
31. NIST STS 2.1 RANDOMNESS TESTS
  • Random Excursions Test determines if the number
    of visits to a particular state within a cycle
    deviates from expected.

32
32. NIST STS 2.1 RANDOMNESS TESTS
  • Random Excursions Variant Test detects deviations
    from the expected number of visits to various
    states in the random walk.

33
33. NIST STS 2.1 RANDOMNESS TESTS
  • Serial Test 1 determines whether the number of
    occurrences of the 2m m-bit overlapping patterns
    is approximately the same.

34
34. NIST STS 2.1 RANDOMNESS TESTS
  • Serial Test 2 determines whether the number of
    occurrences of the 2m m-bit overlapping patterns
    is approximately the same.

35
35. NIST STS 2.1 RANDOMNESS TESTS
  • Linear Complexity Test determines whether or not
    the sequence is complex enough to be considered
    random.

36
(No Transcript)
37
37. TOTALCRYPT
  • Standard security level
  • Personal use
  • Working groups
  • Social networks
  • Small and medium size business

38
38. TOTALCRYPT
  • Advanced security level
  • Bank systems
  • Stock exchange
  • Hi-tech business
  • Municipality
  • Police

39
39. TOTALCRYPT UE
  • Ultimate security level
  • Government systems
  • Security agencies
  • Intelligence agencies
  • Special users
  • Defense

40
40. COMPUTER APPLICATIONS
  • File encryption
  • Protocol encryption
  • Folder encryption
  • USB flash encryption
  • Hard drive encryption
  • Optical drive encryption
  • Encryption processors

41
41. VIDEO APPLICATIONS
  • Video editing / postprocessing
  • Movie edit master archive
  • Mobile TV (4G, 3G)
  • IPTV
  • Cable TV
  • Satellite TV
  • Digital terrestrial TV
  • Video encoder
  • Set-top box

42
42. WIRELESS HDMI NETWORK
DVR FUNCTION
ON THE ROAD
43
43. HDMI CONNECTION
INSTEAD OF CLASSIC WIRED HDMI
CRYPTO LOGICA P2P WIRELESS HDMI LINK
CRYPTO LOGICA ROUTED WIRELESS HDMI LINK
44
44. HDMI NODE
  • Wireless HDMI IEEE802.11g/n
  • Wired HDMI 10/100/1000 Base-T
  • Transmitter at HDMI out port
  • Receiver at HDMI in port
  • CRYPTO LOGICA 4096-bit encryption
  • Single chip without external memory

45
45. HARDWARE ENCRYPTION
  • Lowest cost
  • No dividers
  • No multipliers
  • Ultralow power
  • Integer arithmetic
  • Very low complexity
  • Small integrated memory
  • Ultrafast encryption and decryption
  • Easy radiation hardening

46
46. FINANCIAL APPLICATIONS
  • Database
  • Remote personnal banking
  • Remote corporative banking
  • Interbank communication
  • Automatic teller machines (ATM)
  • Credit card reader (POS-EFT)
  • Stock broker communication
  • Broker investor communication

47
47. MEDICAL APPLICATIONS
  • MAMMOGRAPHY
  • COMPUTERIZED TOMOGRAPHY
  • MAGNETIC RESONANCE IMAGING
  • ULTRASONOGRAPHY
  • X-RADIOGRAPHY
  • TELEMEDICINE
  • Mammography
  • Computerized tomography
  • Magnetic resonance imaging
  • Ultrasonography
  • X-Radiography
  • Telemedicine

48
48. DEFENSE APPLICATIONS
  • Unmanned manned vehicles
  • Warfighters
  • Satellites
  • Surveillance
  • Telemedicine
  • Smart weapons
  • Loitering weapons
  • Face recognition for laser-guided bullets
  • EO, IR, SAR Hyperspectral sensors

49
49. UAS WITH ANALOG LINK
UAV
EO IR SAR
ANALOG LINK
GROUND STATION
STORAGE
COMPUTER MONITOR
50
50. UAS WITH ANALOG LINK
FAST ENCRYPT/DECRYPT LOW LATENCY SMALL WEIGHT
SIZE LOW POWER HEAT INTEROPERABILITY
UAV
EO IR SAR
ANALOG LINK
PC
PDA
GROUND STATION
CRYPTO LOGICA DECRYPTER
CRYPTO LOGICA DECRYPTER
CRYPTO LOGICA ENCRYPTER
COMPUTER MONITOR
VIDEO DECODER PLAYER
VIDEO DECODER PLAYER
VIDEO ENCODER
STORAGE
51
51. UAS WITH DIGITAL LINK
FAST ENCRYPT/DECRYPT HIGH ERROR RESILIENCE LOW
LATENCY SMALL WEIGHT SIZE LOW POWER
HEAT INTEROPERABILITY
UAV
CRYPTO LOGICA ENCRYPTER
EO, IR, SAR VIDEO ENCODER
DIGITAL LINK
PC
PDA
GROUND STATION
CRYPTO LOGICA DECRYPTER
CRYPTO LOGICA DECRYPTER
STORAGE
CRYPTO LOGICA DECRYPTER
VIDEO DECODER PLAYER
VIDEO DECODER PLAYER
VIDEO DECODER PLAYER
52
52. UAS WITH NETWORK LINK
FAST ENCRYPT/DECRYPT HIGH ERROR RESILIENCE LOW
LATENCY SMALL WEIGHT SIZE LOW POWER
HEAT INTEROPERABILITY
UAV
CRYPTO LOGICA ENCRYPTER
EO IR SAR
NETWORK UDP LINK
PC
PDA
GROUND STATION
CRYPTO LOGICA DECRYPTER
CRYPTO LOGICA DECRYPTER
STORAGE
CRYPTO LOGICA DECRYPTER
VIDEO DECODER PLAYER
VIDEO DECODER PLAYER
COMPUTER MONITOR
53
53. DISTRIBUTION OF DIFFERENT RESOLUTIONS WITH
DIFFERENT KEYS
KEY 1 HDTV 1920x1080
KEY 5 ¼ QCIF 120x68
KEY 4 QCIF 240x135
KEY 3 CIF 480x270
KEY 2 SD 960x540
54
WORLDWIDE REPRESENTATIVE
  • Prof. dr. Milan Prokin
  • 381-11-3016-595, 381-11-3016-596
  • 1-310-880-9030, 381-64-4557-702
  • proka_at_el.etf.rs, milan.prokin_at_gmail.com

U.S. REPRESENTATIVE
  • Michael Collins
  • 1-410-326-3001
  • 1-410-320-7906
  • mc_at_ciffbe.com
Write a Comment
User Comments (0)
About PowerShow.com