kryptos presentation-general-v.1-14-01-2017

13
Beginning of a New Cryptic Era KRYTO TECH @Copy Right reserved Krypto Tech Pvt Ltd 2016

Upload: abhijit-hazra

Post on 03-Mar-2017

16 views

Category:

Investor Relations


0 download

TRANSCRIPT

Page 1: Kryptos presentation-general-v.1-14-01-2017

Beginning of a New Cryptic Era

KRYTO TECH

@Copy Right reserved Krypto Tech Pvt Ltd 2016

Page 2: Kryptos presentation-general-v.1-14-01-2017

Agenda

• Why business need Encryption– Drivers for Encryption Adaptation

• Where business use Encryption– Enterprise strategy for Encryption

• What is the future demand• Our Encryption Methodology

– Krypto's Symmetric Technology– Krypto's Asymmetric Technology

• Comparison with existing Encryption Sys-tems

• Opportunities

Page 3: Kryptos presentation-general-v.1-14-01-2017

Why we need Encryption Data protection

Protecting data from theft Protecting integrity of data Protecting malicious use and transfer of Data Protecting Data from non repudiation Authenticating use of Data

Communication Channel Protecting communication channels from unauthorized use and access Protecting communication channels from theft or unauthorize diversion Protecting communication channels from non repudiation and side channel attacks.

Authorization and Authentication Protecting Cloud and Virtualization environment Regulatory Compliances

HIPPA ISO SOX PCI DSS HITECH ACT Other Gov. and Regulatory Requirements

All these regulatory authorities examines encryption mandates and controls.Reviewing specific areas that encryption can have a significant impact in lowering enterprise risk, while improving compliance posture.

Page 4: Kryptos presentation-general-v.1-14-01-2017

Drivers for Encryption Adaption

A Global market report from Ponemon Institute, here we can see the major drivers for Encryption adaptations, where the compliance from regulatory requirements are major contributor.

Page 5: Kryptos presentation-general-v.1-14-01-2017

Where business use Encryption

Page 6: Kryptos presentation-general-v.1-14-01-2017

Strategy for Encryption

There has been a steady increase in organizations with an encryption strategy applied consistently across the entire enterprise. In turn, there has been a steady de-cline in organizations not having an encryption plan or strategy.

Page 7: Kryptos presentation-general-v.1-14-01-2017

Future Encryption Demand1. Encryption for different financial transpiration and

transaction . 2. Creating Segregated environment for tenants in

Multi-Tenant cloud environment.3. Encryption Solutions protecting National Security

information from Cyber War.4. Encryption Solutions for Strategic Manufacturing

(Aerospace & Defense). 5. Encryption Solutions for Public/Private Security/In-

telligence/Investigation Agencies.6. Encryption solution for Wireless Communication. 7. Encryption for Hardware based encryption systems8. Encryption for media (Image, Audio, Video)9. Secure voice communication 10. Big Data Encryption.

Page 8: Kryptos presentation-general-v.1-14-01-2017

Our Encryption MethodologyKRYPTOS Symmetric Encryption

• Encryption key size (bits) : 1024 Block size (bits) : 1024 • Key generation : Uses a discrete math function having

similarity with Feistel structure. • Unique algorithm is used to generate cipher key of 1024

bits block size. • Minimizes key generation time to a great extent. • Cipher key size always maintained at 1024 bits irrespec-

tive of data size. • Unique encryption principle; an algorithm dependent on a

discrete math function.• 2 sets of cipher text generated during encryption. Both

are different in nature • Both are inter-dependent • Encrypt any file format (video, image, text, message etc.),

storage media etc

Page 9: Kryptos presentation-general-v.1-14-01-2017

Our Encryption MethodologyKRYPTOS Asymmetric Encryption

• Private key size (bit) :3072 Public key size (bit) : 3072 • Key size can be enhanced further never risking time,

power wastage on key generation procedure and neither at the risk of server storage capacity.

• Key generation : Uses a one-way discrete math function. • Unique algorithm is used generation cipher key of 3072 bit

block size of higher. • Minimizes key generation time to a great extent. • Cipher key size always maintained at 3072 bits or higher ir-

respective of data size • 2 sets of Private key and 1 public key (for storing in public

domain ) are generated during encryption. • Enhances security to the next level. • Encrypt any file format (video, image, text, message etc.),

storage media etc

Page 10: Kryptos presentation-general-v.1-14-01-2017

Comparison with ExistingRSA DH/DSA KRYPTOS

Key Size 2 0 4 8 b it s . PKCS ver.2.0 & 2.1

2 0 4 8 b it s . PKCS ver.2.0 & 2.1

3072 bits

No of Key 1 Public key1 Private key

1 Public key1 Private key

1 Public key 1 Private key

Commonly used

Digital signing of data store & forward Data On-line communication

Digital signing of data store & forward Data On-line com-munication

Digital signing of data store & forward Data Online com-munication

Digital Sign of Data

Signing - Very slow Verification - Very fast

Signing - Very slow Verification - Very fast

Signing - Faster than DH/DSA* Veri-fication - Faster than RSA*

Store Forward Decryption- Very Slow Encryption- Very Slow

Decryption- Very Slow Encryption- Very Slow

Signing - Faster than DH/DSA* Veri-fication - Faster than RSA*

All claims can be demonstrated during proof of concept

Page 11: Kryptos presentation-general-v.1-14-01-2017

Opportunities

• Digital Signature • Drive Encryption • Cloud Drive Encryption e.g.

Dropbox • Prime number generator • Crypto Currencies • Kryptos System (Cloud Local

and Portable Encryption)

Page 12: Kryptos presentation-general-v.1-14-01-2017

DEMO

Call us for Demo# +91 9836411688# +91 9830794045

For More Details www.krytotech.com

Page 13: Kryptos presentation-general-v.1-14-01-2017

THANK YOU