encryption symmetric key

23
Abstracts of Clape Technologies www.clape. io

Upload: mdhar123

Post on 22-May-2015

541 views

Category:

Technology


3 download

DESCRIPTION

Product of Clape Technologies Ltd.

TRANSCRIPT

Page 1: Encryption symmetric key

Abstracts of Clape Technologieswww.clape.i

o

Page 2: Encryption symmetric key

Asansol Astha IT Projects (P) Ltd. is an well-established, result-oriented IT Solutions Company. We are highly client-oriented and quality-conscious and our portfolio basket includes a wide range of services and solutions in the area of Data Security & Business Applications.  Clape Technologies Ltd (A sister organization of Asansol Astha IT Projects (P) Ltd.) is working upon the patent pending symmetric key encryption standard and the Abstract of the patent application is detailed below.

Asansol Astha IT Projects (P) Ltd.

Page 3: Encryption symmetric key

Abstract of the Patent Application for Symmetric Key Encryption Standard

The present invention relates to a system and a method for secured transmission of data. The method comprises the steps of providing the data, generating a password or a key by a user, encrypting the data by the password or the key for plural number of times resulting plurality of cipher texts, sending plurality of the cipher texts and the password or key, and decrypting the cipher text by the password or the key. The system comprises input device means for providing the data, input device means for generating a password by a user, processor means encrypting the data by the password or key for plural number of times resulting plurality of cipher texts, means for sending the plurality of cipher texts and the password and means for decrypting the cipher text by the password or key.

Page 4: Encryption symmetric key

What the Company does:-•Our Company has conceived a Symmetric Key Encryption Standard and has filed for patenting in Indian Patent Office vide application no.0992/KOL/2011 dated. 26.07.2011 in Kolkata Patent Office Entitled as “A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC COMMUNICATIONS.” And was published in the Indian Patent Office Journal on 2nd December 2011. Moreover we have applied for patenting in USPTO vide application no 13/557112 date 24.07.2012 and was published in USPTO Journal on 31.12.2012

•The Company has also applied for a Asymmetric Key cryptographic Standard and has filed for patenting in Indian Patent Office (I.P.O Kolkata ) vide application no.446/KOL/2012 dated. 19/04/2012 in Kolkata Patent Office Entitled as “METHOD FOR ESTABLISHING SECURE COMMUNICATION IN A NETWORK AND SYSTEM THEREOF” And was published in the Indian Patent Office(IPO) Journal on 24/08/2012

Page 5: Encryption symmetric key

TechnologyEvery block cipher involves a transformation of a block of plain text into block of cipher text, where the transformation depends on the cipher key. The mechanism of our encryption procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key.The technology a basic building block, which encrypts / decrypts a fixed size block of data, however to use these in practice, we usually need to handle arbitrary amount of data , which may be available in advance, (in which case a block mode is appropriate).

Page 6: Encryption symmetric key

Technology•Block size: with a view to improve security the block size has been increased but without any compromise to the speed of the procedure.

•Key Size: increasing size improves security, makes exhaustive key searching harder but without any compromise with the speed of encryption / decryption function.

•Number of rounds: increasing number of rounds in our technology shall improve security but without slowing the Cipher Generation Procedure.

Page 7: Encryption symmetric key

CLAPE CIPHER DESIGN PRINCIPLES :It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations of an elaborate combination of table look up and bits rearrange. 

Through this procedure the password key is being made into a 1024 bit block size and correspondingly a chunk of plain text of same bit size are being put into our own encryption algorithm to generate a chunk of cipher text.It is commonly believed that the strength of the Password much depends on the method how the encryption algorithm is deployed. 

In practicality, it has been observed that the user doesn't always want to use password as long as needed for effective key generation.As such responsibility of securing the password of the user rests on the Encryption Technology.

There is no need for using salts/pass phrases in this technology for strengthening the password what any common user tends to apply to achieve utmost security.

Page 8: Encryption symmetric key

Recent attacks on existing workhorse algorithms

http://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show-mathematically-crackable-flaws-in-common-web-encryption/

http://arstechnica.com/security/2013/02/lucky-thirteen-attack-snarfs-cookies-protected-by-ssl-encryption/

http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/

http://www.isg.rhul.ac.uk/~kp/padding.pdf

The Cryptographic community needs to provide the world with a new encryption standard.The few workhorse algorithms for the last few decades are nearing the end of their useful life cycle.Moreover the recent attacks as evident in the following links provided herein:- 

Page 9: Encryption symmetric key

In this context if the world is to have a secure reliable and easily available encryption algorithm by the turn of the decade the world needs several candidate symmetric Key encryption algorithms now. These algorithms have to be subjected to years of public scrutiny and cryptanalysis. We are confident that our encryption standard will survive this process and shall eventually become a new standard.

Mission:-

Page 10: Encryption symmetric key

Performance Comparison Study:

This comparison has been conducted to measure encryption / decryption speed of Clape with other encryption algorithms like Blow fish, AES, DES, 3DES etc. at different settings for each algorithm such as; different sizes of data blocks, different key sizes, encryption / decryption speed / power Consumption etc.

Page 11: Encryption symmetric key

THIS STUDY EVALUATES SEVEN DIFFERENT

ENCRYPTION ALGORITHMS NAMELY; AES,

DES, 3DES, RC6, BLOWFISH, RC2 & CLAPE.

THE PERFORMANCE MEASURE OF

ENCRYPTION SCHEMES HAS BEEN

CONDUCTED IN TERMS OF CHANGING FILE

SIZE FOR THE SELECTED CRYPTOGRAPHIC

ALGORITHMS.

Page 12: Encryption symmetric key

Hardware used: i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM

Energy consumption : It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.

All the tests have been performed on commonly known file formats.

Specifications:

Page 13: Encryption symmetric key

Time Comparison of encryption algorithms

Results are based on base 64 encoding

Page 14: Encryption symmetric key

Decryption Time (in milliseconds)Results are based on base 64 encoding

Page 15: Encryption symmetric key

Encryption Time (in milliseconds) for Medium Size of file

Results are based on base 64 encoding

Page 16: Encryption symmetric key

Decryption Time (in milliseconds) for Medium Size of file

Results are based on base 64 encoding

Page 17: Encryption symmetric key

Encryption Time (in milliseconds)

Results are based on base 64 encoding

Page 18: Encryption symmetric key

Decryption Time (in milliseconds)

Results are based on base 64 encoding

Page 19: Encryption symmetric key

Graph showing time consumption for encryption with different key sizes for a specific size of File (7.14MB).

Results are based on base 64 encoding

Page 20: Encryption symmetric key

Graph showing time consumption for decryption with different key sizes for a specific size of File (7.14MB).

Results are based on base 64 encoding

Page 21: Encryption symmetric key

Graph showing time consumption for encryption with different key sizes for a specific size of File (694 Kb)

Results are based on base 64 encoding

Page 22: Encryption symmetric key

Graph showing time consumption for decryption with different key sizes for a specific size of File (694 Kb)

Results are based on base 64 encoding

Page 23: Encryption symmetric key

Acknowledgement:-International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010} International Business Information Management Association (IBIMA).

THANK YOU

Looking forward to arranging a presentation to demonstrate the authenticity of our claims through Remote Screen Sharing / visit to our lab /any other conceivable mode of testing.

Websites:www.clape.io

www.asthaitsolutions.com

Contacts:+1 202 642 3323 (USA)+91 341 225 0077 (India)

E-mail:[email protected] [email protected]