strategic encryption . 2. technology features future proof – available today encryption with any...

54
STRATEGIC ENCRYPTION www.crypto-logica.com

Upload: isabella-deen

Post on 15-Dec-2015

223 views

Category:

Documents


1 download

TRANSCRIPT

STRATEGIC ENCRYPTIONSTRATEGIC ENCRYPTION

www.crypto-logica.comwww.crypto-logica.com

2. TECHNOLOGY FEATURES2. TECHNOLOGY FEATURES

• Future proof – available today

• Encryption with ANY key length

• Authentication with ANY hash length

• Brutal force security

• Secure against computing developments

• Any cryptanalysis security

• Linear cryptanalysis security

• Differential cryptanalysis security

• No backdoor for decryption without a key

• Future proof – available today

• Encryption with ANY key length

• Authentication with ANY hash length

• Brutal force security

• Secure against computing developments

• Any cryptanalysis security

• Linear cryptanalysis security

• Differential cryptanalysis security

• No backdoor for decryption without a key

3. ANY KEY LENGTH3. ANY KEY LENGTH

4. ALGORITHM FEATURES4. ALGORITHM FEATURES

• Non-polynomial (NP) key finding problem

• Key lengths chosen for NP problem

• No matrix operations

• No vector operations

• No S-boxes

• Simple non-linear arithmetic operations

• Huge bit diffusion

• Huge bit confusion

• Perfect randomness

• Non-polynomial (NP) key finding problem

• Key lengths chosen for NP problem

• No matrix operations

• No vector operations

• No S-boxes

• Simple non-linear arithmetic operations

• Huge bit diffusion

• Huge bit confusion

• Perfect randomness

5. DEVELOPED TECHNOLOGY5. DEVELOPED TECHNOLOGY

• 4 simple stream methods

• 4 hybrid symmetric stream methods

• 4 hybrid symmetric block methods

• 8 hybrid hash methods

• Zero encryption overhead

• Identical ciphertext and plaintext bitrate

• Identical ciphertext and plaintext file size

• Key length from 256 to 4.294.967.296 bits

• Speed almost independent on key length

• 4 simple stream methods

• 4 hybrid symmetric stream methods

• 4 hybrid symmetric block methods

• 8 hybrid hash methods

• Zero encryption overhead

• Identical ciphertext and plaintext bitrate

• Identical ciphertext and plaintext file size

• Key length from 256 to 4.294.967.296 bits

• Speed almost independent on key length

6. DEVELOPED ENCRYPTION METHODS6. DEVELOPED ENCRYPTION METHODS

TYPEENCRYPTION METHOD KEY LENGTH [bits]

BLOCK[bits]

SHORT LONG MIN MAX

Stream CLIS Ideal Stream (4) 256 4096 ∞

Stream CLOS Occult Stream 256 ∞ 128

Stream CLAS Advanced Stream 512 ∞ 256

Stream CLUS Ultimate Stream 384 ∞ 256

Stream CLES Extreme Stream 768 ∞ 256

Block CLOB Occult Block 256 ∞ 128

Block CLAB Advanced Block 512 ∞ 256

Block CLUB Ultimate Block 384 ∞ 256

Block CLEB Extreme Block 768 ∞ 256

7. ENCRYPTION METHODS7. ENCRYPTION METHODS

• All stream ciphers except CLIS are hybrid (stream+block) symmetric stream ciphers, wherein the position of each bit in plaintext input stream or file remains intact in ciphertext output stream or file

• All block ciphers are hybrid (stream+block) symmetric block ciphers, wherein the position of each bit in plaintext input stream or file is diffused within 256 or 128 bit block in ciphertext output stream or file

• All stream ciphers except CLIS are hybrid (stream+block) symmetric stream ciphers, wherein the position of each bit in plaintext input stream or file remains intact in ciphertext output stream or file

• All block ciphers are hybrid (stream+block) symmetric block ciphers, wherein the position of each bit in plaintext input stream or file is diffused within 256 or 128 bit block in ciphertext output stream or file

8. TYPE DIFFERENCE8. TYPE DIFFERENCE

• Family of customized algorithms

• Algorithms have adjustable parameters

• User can change algorithm parameters

• Enormous increase of number of methods

• Additional customized algorithm security

• Unknown algorithm for unauthorized

• Private algorithm provides open solution

• No extraction of customized parameters by anyone including Crypto Logica Team

• Family of customized algorithms

• Algorithms have adjustable parameters

• User can change algorithm parameters

• Enormous increase of number of methods

• Additional customized algorithm security

• Unknown algorithm for unauthorized

• Private algorithm provides open solution

• No extraction of customized parameters by anyone including Crypto Logica Team

9. ALGORITHM CUSTOMIZATION9. ALGORITHM CUSTOMIZATION

10. SOFTWARE METHODS10. SOFTWARE METHODS

• Stream Offset

• Stream Sum

• Stream Counter

• Stream Increment

Parameters’ width depends on internal data:

• 8 x 8-bit (64-bit total) for 8-bit data

• 8 x 16 bit (128-bits total) for 16-bit data

• 8 x 32 bit (256-bits total) for 32-bit data

• 8 x 64 bit (512-bits total) for 64-bit data

• Stream Offset

• Stream Sum

• Stream Counter

• Stream Increment

Parameters’ width depends on internal data:

• 8 x 8-bit (64-bit total) for 8-bit data

• 8 x 16 bit (128-bits total) for 16-bit data

• 8 x 32 bit (256-bits total) for 32-bit data

• 8 x 64 bit (512-bits total) for 64-bit data

11. CIPHER PARAMETERS11. CIPHER PARAMETERS

• Block Offset

• Block Rounds

• Block Counter

• Block Increment

• Block Offset

• Block Rounds

• Block Counter

• Block Increment

• Stream Offset

• Stream Sum

• Stream Counter

• Stream Increment

• Hash Length

Hash Length is completely freely chosen

Hash Length can be any number

Hash Signature is completely freely chosen

Hash Signature can be any number

• Stream Offset

• Stream Sum

• Stream Counter

• Stream Increment

• Hash Length

Hash Length is completely freely chosen

Hash Length can be any number

Hash Signature is completely freely chosen

Hash Signature can be any number

12. HASH PARAMETERS12. HASH PARAMETERS

• Block Offset

• Block Rounds

• Block Counter

• Block Increment

• Hash Signature

• Block Offset

• Block Rounds

• Block Counter

• Block Increment

• Hash Signature

13. OPTIONAL KEY GENERATION13. OPTIONAL KEY GENERATION

• User password with at least 16-characters

• 1-bit difference in two passwords provides two completely different uncorrelated keys

• Key is not stored in any peripheral memory media in any form

• Lost password prevents decryption

• Any secure public key cryptography can be used for key exchange

• Crypto Logica Team is developing its own fast public key cryptography

• User password with at least 16-characters

• 1-bit difference in two passwords provides two completely different uncorrelated keys

• Key is not stored in any peripheral memory media in any form

• Lost password prevents decryption

• Any secure public key cryptography can be used for key exchange

• Crypto Logica Team is developing its own fast public key cryptography

14. SPEED, LATENCY, POWER, COST14. SPEED, LATENCY, POWER, COST

• Faster encryption than AES

• Smaller encrypter latency

• Encrypter power savings

• Smaller encrypter cost

• Faster decryption than AES

• Smaller decrypter latency

• Decrypter power savings

• Smaller decrypter cost

• Maximum processor efficiency

• Faster encryption than AES

• Smaller encrypter latency

• Encrypter power savings

• Smaller encrypter cost

• Faster decryption than AES

• Smaller decrypter latency

• Decrypter power savings

• Smaller decrypter cost

• Maximum processor efficiency

15. CRYPTOLOGICA DEMO SOFTWARE15. CRYPTOLOGICA DEMO SOFTWARE

16. SPEED @ SINGLE THREAD i7 2.2GHz16. SPEED @ SINGLE THREAD i7 2.2GHzTYPE

NATIVE CLALGORITHM VS AES CTROPTIMIZED

KEYLENGTH[bits]

BLOCKSIZE[bits]

ENC/DECSPEED[Gbit/s]

CL SPEEDAES SPEED

B AES CTR 256 128 1,401 1

S CLIS 4096 ∞ 6,752 4,819

S CLOS 4096 128 5,308 3,789

S CLAS 4096 256 6,663 4,756

S CLUS 4096 256 6,834 4,878

S CLES 4096 256 4,544 3,243

B CLOB 4096 128 5,263 3,757

B CLAB 4096 256 6,799 4,853

B CLUB 4096 256 6,594 4,707

B CLEB 4096 256 4,640 3,312

17. ENCRYPTION/DECRYPTION SPEED17. ENCRYPTION/DECRYPTION SPEED

Speed Non-Optimized CL and Optimized AES CTR [Gbit/s]

0

1

2

3

4

5

6

7

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

18. CL SPEED / AES SPEED18. CL SPEED / AES SPEED

• AES = AES CTR in all diagrams

• Plaintext = All 0’s (worst case)

• Key = All 0’s (worst case)

• AES = AES CTR in all diagrams

• Plaintext = All 0’s (worst case)

• Key = All 0’s (worst case)Speed Non-Optimized CL / Optimized AES CTR [Gbit/s]

0.00

1.00

2.00

3.00

4.00

5.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

19. NIST STS 2.1 RANDOMNESS TESTS19. NIST STS 2.1 RANDOMNESS TESTS

• Frequency Test within a Block determines whether the frequency of ones in an M-bit block is approximately M/2.

• Frequency Test within a Block determines whether the frequency of ones in an M-bit block is approximately M/2.

Block Frequency

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

20. NIST STS 2.1 RANDOMNESS TESTS20. NIST STS 2.1 RANDOMNESS TESTS

• Frequency Test within a Block determines whether the frequency of ones in an M-bit block is approximately M/2.

• Frequency Test within a Block determines whether the frequency of ones in an M-bit block is approximately M/2.

Block Frequency

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

Cumulative Sums - Forward

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

21. NIST STS 2.1 RANDOMNESS TESTS21. NIST STS 2.1 RANDOMNESS TESTS

• Cumulative Sums (Cusum-Forward) Test determines whether the cumulative sum of the partial sequences occurring in the tested sequence is too large or too small.

• Cumulative Sums (Cusum-Forward) Test determines whether the cumulative sum of the partial sequences occurring in the tested sequence is too large or too small.

Cumulative Sums - Reverse

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

22. NIST STS 2.1 RANDOMNESS TESTS22. NIST STS 2.1 RANDOMNESS TESTS

• Cumulative Sums (Cusum-Reverse) Test determines whether the cumulative sum of the partial sequences occurring in the tested sequence is too large or too small.

• Cumulative Sums (Cusum-Reverse) Test determines whether the cumulative sum of the partial sequences occurring in the tested sequence is too large or too small.

Runs

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

23. NIST STS 2.1 RANDOMNESS TESTS23. NIST STS 2.1 RANDOMNESS TESTS

• Runs Test determines whether the number of runs (uninterrupted sequence of identical bits) of ones and zeros of various lengths is as expected for a random seq.

• Runs Test determines whether the number of runs (uninterrupted sequence of identical bits) of ones and zeros of various lengths is as expected for a random seq.

Longest Run

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

24. NIST STS 2.1 RANDOMNESS TESTS24. NIST STS 2.1 RANDOMNESS TESTS

• Test for the Longest Run of Ones in a Block determines whether the length of the longest run of ones is consistent with the expected length.

• Test for the Longest Run of Ones in a Block determines whether the length of the longest run of ones is consistent with the expected length.

25. NIST STS 2.1 RANDOMNESS TESTS25. NIST STS 2.1 RANDOMNESS TESTS

• Binary Matrix Rank Test determines the linear dependence among fixed length substrings of the original sequence.

• Binary Matrix Rank Test determines the linear dependence among fixed length substrings of the original sequence.

Rank

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

26. NIST STS 2.1 RANDOMNESS TESTS26. NIST STS 2.1 RANDOMNESS TESTS

• Discrete Fourier Transform (Spectral) Test detects periodic features (i.e. repetitive patterns that are near each other).

• Discrete Fourier Transform (Spectral) Test detects periodic features (i.e. repetitive patterns that are near each other).

FFT

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

27. NIST STS 2.1 RANDOMNESS TESTS27. NIST STS 2.1 RANDOMNESS TESTS

• Non-overlapping Template Matching Test detects too many occurences of a given non-periodic (aperiodic) pattern.

• Non-overlapping Template Matching Test detects too many occurences of a given non-periodic (aperiodic) pattern.

Non-overlapping Template (min)

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

28. NIST STS 2.1 RANDOMNESS TESTS28. NIST STS 2.1 RANDOMNESS TESTS

• Overlapping Template Matching Test determines the number of occurrences of pre-specified target strings.

• Overlapping Template Matching Test determines the number of occurrences of pre-specified target strings.

Overlapping Template

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

29. NIST STS 2.1 RANDOMNESS TESTS29. NIST STS 2.1 RANDOMNESS TESTS

• Mauer’s “Universal Statistical” Test detects whether or not the sequence can be significantly compressed without loss of information.

• Mauer’s “Universal Statistical” Test detects whether or not the sequence can be significantly compressed without loss of information.

Universal

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

30. NIST STS 2.1 RANDOMNESS TESTS30. NIST STS 2.1 RANDOMNESS TESTS

• Approximate Entropy Test compares the frequency of all possible overlapping m-bit patterns across the entire sequence.

• Approximate Entropy Test compares the frequency of all possible overlapping m-bit patterns across the entire sequence.

Approximate Entropy

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

31. NIST STS 2.1 RANDOMNESS TESTS31. NIST STS 2.1 RANDOMNESS TESTS

• Random Excursions Test determines if the number of visits to a particular state within a cycle deviates from expected.

• Random Excursions Test determines if the number of visits to a particular state within a cycle deviates from expected.

Random Excursions (min)

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

32. NIST STS 2.1 RANDOMNESS TESTS32. NIST STS 2.1 RANDOMNESS TESTS

• Random Excursions Variant Test detects deviations from the expected number of visits to various states in the random walk.

• Random Excursions Variant Test detects deviations from the expected number of visits to various states in the random walk.

Random Excursions Variant (min)

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

33. NIST STS 2.1 RANDOMNESS TESTS33. NIST STS 2.1 RANDOMNESS TESTS

• Serial Test 1 determines whether the number of occurrences of the 2^m m-bit overlapping patterns is approximately the same.

• Serial Test 1 determines whether the number of occurrences of the 2^m m-bit overlapping patterns is approximately the same.

Serial 1

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

34. NIST STS 2.1 RANDOMNESS TESTS34. NIST STS 2.1 RANDOMNESS TESTS

• Serial Test 2 determines whether the number of occurrences of the 2^m m-bit overlapping patterns is approximately the same.

• Serial Test 2 determines whether the number of occurrences of the 2^m m-bit overlapping patterns is approximately the same.

Serial 2

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

35. NIST STS 2.1 RANDOMNESS TESTS35. NIST STS 2.1 RANDOMNESS TESTS

• Linear Complexity Test determines whether or not the sequence is complex enough to be considered random.

• Linear Complexity Test determines whether or not the sequence is complex enough to be considered random.

Linear Complexity

0.95

0.96

0.97

0.98

0.99

1.00

AES CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB

37. TOTALCRYPT37. TOTALCRYPT

• Standard security level

• Personal use

• Working groups

• Social networks

• Small and medium size business

• Standard security level

• Personal use

• Working groups

• Social networks

• Small and medium size business

38. TOTALCRYPT+38. TOTALCRYPT+

• Advanced security level

• Bank systems

• Stock exchange

• Hi-tech business

• Municipality

• Police

• Advanced security level

• Bank systems

• Stock exchange

• Hi-tech business

• Municipality

• Police

39. TOTALCRYPT UE39. TOTALCRYPT UE

• Ultimate security level

• Government systems

• Security agencies

• Intelligence agencies

• Special users

• Defense

• Ultimate security level

• Government systems

• Security agencies

• Intelligence agencies

• Special users

• Defense

40. COMPUTER APPLICATIONS40. COMPUTER APPLICATIONS

• File encryption

• Protocol encryption

• Folder encryption

• USB flash encryption

• Hard drive encryption

• Optical drive encryption

• Encryption processors

• File encryption

• Protocol encryption

• Folder encryption

• USB flash encryption

• Hard drive encryption

• Optical drive encryption

• Encryption processors

41. VIDEO APPLICATIONS41. VIDEO APPLICATIONS

• Video editing / postprocessing

• Movie edit master & archive

• Mobile TV (4G, 3G)

• IPTV

• Cable TV

• Satellite TV

• Digital terrestrial TV

• Video encoder

• Set-top box

• Video editing / postprocessing

• Movie edit master & archive

• Mobile TV (4G, 3G)

• IPTV

• Cable TV

• Satellite TV

• Digital terrestrial TV

• Video encoder

• Set-top box

42. WIRELESS HDMI NETWORK42. WIRELESS HDMI NETWORK

DVR FUNCTION

DVR FUNCTION

ON THE ROADON THE ROAD

43. HDMI CONNECTION43. HDMI CONNECTION

HDMI HDMI

HDMI CL Tx HDMI CL Rx

HDMI CL Tx HDMI CL Rx

INSTEAD OF CLASSIC WIRED HDMIINSTEAD OF CLASSIC WIRED HDMI

CRYPTO LOGICA P2P WIRELESS HDMI LINKCRYPTO LOGICA P2P WIRELESS HDMI LINK

CRYPTO LOGICA ROUTED WIRELESS HDMI LINKCRYPTO LOGICA ROUTED WIRELESS HDMI LINK

44. HDMI NODE44. HDMI NODE

• Wireless HDMI IEEE802.11g/n

• Wired HDMI 10/100/1000 Base-T

• Transmitter at HDMI out port

• Receiver at HDMI in port

• CRYPTO LOGICA ≤ 4096-bit encryption

• Single chip without external memory

• Wireless HDMI IEEE802.11g/n

• Wired HDMI 10/100/1000 Base-T

• Transmitter at HDMI out port

• Receiver at HDMI in port

• CRYPTO LOGICA ≤ 4096-bit encryption

• Single chip without external memory

TRANSMIT CL Node

HDMIRx

32bit RISCCompressorCL encrypter

802.11g

RECEIVE CL Node

HDMITx

32bit RISCCL decrypter

Decompressor802.11g

45. HARDWARE ENCRYPTION45. HARDWARE ENCRYPTION

• Lowest cost

• No dividers

• No multipliers

• Ultralow power

• Integer arithmetic

• Very low complexity

• Small integrated memory

• Ultrafast encryption and decryption

• Easy radiation hardening

• Lowest cost

• No dividers

• No multipliers

• Ultralow power

• Integer arithmetic

• Very low complexity

• Small integrated memory

• Ultrafast encryption and decryption

• Easy radiation hardening

46. FINANCIAL APPLICATIONS46. FINANCIAL APPLICATIONS

• Database

• Remote personnal banking

• Remote corporative banking

• Interbank communication

• Automatic teller machines (ATM)

• Credit card reader (POS-EFT)

• Stock – broker communication

• Broker – investor communication

• Database

• Remote personnal banking

• Remote corporative banking

• Interbank communication

• Automatic teller machines (ATM)

• Credit card reader (POS-EFT)

• Stock – broker communication

• Broker – investor communication

• MAMMOGRAPHY

• COMPUTERIZED TOMOGRAPHY

• MAGNETIC RESONANCE IMAGING

• ULTRASONOGRAPHY

• X-RADIOGRAPHY

• TELEMEDICINE

• Mammography

• Computerized tomography

• Magnetic resonance imaging

• Ultrasonography

• X-Radiography

• Telemedicine

• Mammography

• Computerized tomography

• Magnetic resonance imaging

• Ultrasonography

• X-Radiography

• Telemedicine

47. MEDICAL APPLICATIONS47. MEDICAL APPLICATIONS

• Unmanned & manned vehicles

• Warfighters

• Satellites

• Surveillance

• Telemedicine

• Smart weapons

• Loitering weapons

• Face recognition for laser-guided bullets

• EO, IR, SAR & Hyperspectral sensors

• Unmanned & manned vehicles

• Warfighters

• Satellites

• Surveillance

• Telemedicine

• Smart weapons

• Loitering weapons

• Face recognition for laser-guided bullets

• EO, IR, SAR & Hyperspectral sensors

48. DEFENSE APPLICATIONS48. DEFENSE APPLICATIONS

49. UAS WITH ANALOG LINK49. UAS WITH ANALOG LINK

COMPUTERMONITOR

EOIRSAR

STORAGE

UAVUAV

GROUND STATIONGROUND STATION

ANALOG LINKANALOG LINK

50. UAS WITH ANALOG LINK50. UAS WITH ANALOG LINK

VIDEOENCODER

COMPUTERMONITOR

EOIRSAR

CRYPTOLOGICA

ENCRYPTER

FAST ENCRYPT/DECRYPT

LOW LATENCY

SMALL WEIGHT & SIZE

LOW POWER & HEAT

INTEROPERABILITY

FAST ENCRYPT/DECRYPT

LOW LATENCY

SMALL WEIGHT & SIZE

LOW POWER & HEAT

INTEROPERABILITY

VIDEODECODER+ PLAYER

CRYPTOLOGICA

DECRYPTER

VIDEODECODER+ PLAYER

CRYPTOLOGICA

DECRYPTER

UAVUAV

GROUND STATIONGROUND STATION

ANALOG LINKANALOG LINK

PCPC PDAPDA

STORAGE

51. UAS WITH DIGITAL LINK51. UAS WITH DIGITAL LINK

VIDEODECODER+ PLAYER

EO, IR, SARVIDEO

ENCODER

CRYPTOLOGICA

DECRYPTER

CRYPTOLOGICA

ENCRYPTER

STORAGE

FAST ENCRYPT/DECRYPT

HIGH ERROR RESILIENCE

LOW LATENCY

SMALL WEIGHT & SIZE

LOW POWER & HEAT

INTEROPERABILITY

FAST ENCRYPT/DECRYPT

HIGH ERROR RESILIENCE

LOW LATENCY

SMALL WEIGHT & SIZE

LOW POWER & HEAT

INTEROPERABILITY

VIDEODECODER+ PLAYER

CRYPTOLOGICA

DECRYPTER

VIDEODECODER+ PLAYER

CRYPTOLOGICA

DECRYPTER

UAVUAV

GROUND STATIONGROUND STATION

DIGITAL LINKDIGITAL LINK

PCPC PDAPDA

52. UAS WITH NETWORK LINK52. UAS WITH NETWORK LINK

COMPUTERMONITOR

EOIR

SAR

CRYPTOLOGICA

DECRYPTER

CRYPTOLOGICA

ENCRYPTER

STORAGE

VIDEODECODER+ PLAYER

CRYPTOLOGICA

DECRYPTER

VIDEODECODER+ PLAYER

CRYPTOLOGICA

DECRYPTER

UAVUAV

GROUND STATIONGROUND STATION

NETWORK UDP LINKNETWORK UDP LINK

PCPC PDAPDA

FAST ENCRYPT/DECRYPT

HIGH ERROR RESILIENCE

LOW LATENCY

SMALL WEIGHT & SIZE

LOW POWER & HEAT

INTEROPERABILITY

FAST ENCRYPT/DECRYPT

HIGH ERROR RESILIENCE

LOW LATENCY

SMALL WEIGHT & SIZE

LOW POWER & HEAT

INTEROPERABILITY

53. DISTRIBUTION OF DIFFERENT RESOLUTIONS WITH DIFFERENT KEYS

53. DISTRIBUTION OF DIFFERENT RESOLUTIONS WITH DIFFERENT KEYS

KEY 1

HDTV

1920x1080

KEY 1

HDTV

1920x1080

KEY 2 SD 960x540KEY 2 SD 960x540

KEY 3 CIF

480x270

KEY 3 CIF

480x270

KEY 4

QCIF

240x135

KEY 4

QCIF

240x135

KEY 5

¼ QCIF

120x68

KEY 5

¼ QCIF

120x68

WORLDWIDE REPRESENTATIVEWORLDWIDE REPRESENTATIVE

• Prof. dr. Milan Prokin

• +381-11-3016-595, +381-11-3016-596

• +1-310-880-9030, +381-64-4557-702

[email protected], [email protected]

• Prof. dr. Milan Prokin

• +381-11-3016-595, +381-11-3016-596

• +1-310-880-9030, +381-64-4557-702

[email protected], [email protected]

• Michael Collins

• +1-410-326-3001

• +1-410-320-7906

[email protected]

• Michael Collins

• +1-410-326-3001

• +1-410-320-7906

[email protected]

U.S. REPRESENTATIVEU.S. REPRESENTATIVE