Title: Semantic Encoding
1Semantic Encoding
A Fundamentally New Database Security
Technology
Developed by
D. Paul Benjamin Pace University
Adrian Walker Reengineering LLC
Note this presentation contains audio
2System
Subsystem
Subsystem
Subsystem
Subsystem
3System
Subsystem
Subsystem
Subsystem
Subsystem
4World Economy
Inflation Rate
Commodity Prices
Interest Rates
Unemployment Rate
5Relational Table
Projection 1
Projection 2
Projection 3
6Reassembly of Projected Tables
?
?
. . .
?
?
?
Projection 1
Projection 2
Projection 3
7Parametrization of Reassemblies
. . .
392417895
3
2
392417896
1
8The Security of Encryption
GGCGw98a08das8d9812hfp9h(H(8he98roi3jf
C_at_H))F)JnjkH2oiOIhew884KND((_at_gt?ltMFD
. . .
00sjj09sdjfqkgt)HNH)oikjsaoioieooihof230-k
The shipment is at 930pm and will originate at
A9o32W)_at_NNWN)AS)NOIpoj2pr90-uj32m/.,
9The Security of Semantic Encoding
?
?
. . .
?
?
?
10A Detailed Look at Semantic Encoding
356 75 35 1999
245 12 456
877 54 13 9
13 8765
876 6444 289 12
ID info
salary info
11A Detailed Look at Semantic Encoding
876 6444 289 12
356 75 35 1999
13 8765
245 12 456
877 54 13 9
356 75 35 1999
245 12 456
877 54 13 9
13 8765
876 6444 289 12
ID info
salary info
13 8765
876 6444 289 12
877 54 13 9
245 12 456
356 75 35 1999
Every permutation gives a realistic reassembly.
12The Permutation is the Key
78 229 35 79875 378 33 92 478 8364 22245 34 389
555
A permutation
Pseudo-random number generator
. . .
78
229
35
79875
13User-entered parameters
Pseudo-random number generator
. . .
78
229
35
79875
Semantic Encoding Module
14User-entered Key
DES Algorithm
Bitstring from Binary Polynomial
. . .
78
229
35
79875
Semantic Encoding Module
15Entropy Source
. . .
78
229
35
79875
Semantic Encoding Module
16Advantages of Semantic Encoding
356 75 35 1999
245 12 456
877 54 13 9
13 8765
876 6444 289 12
Semantic Encoding is permanently unbreakable.
Tables can be compressed
by large factors.
Changing keys is easy,
and orders of magnitude faster.
Semantic Encoding works with encryption
to add extra security.
Multi-level security is easy to implement.
Individual keys for different users are possible.
17Key Management using Encryption
User 1
User 3
User 2
18Key Management using Semantic Encoding
43 297 91 73
88 297 91 427
427 27 31 78
14 634 87 99
634 87
19Thank You.