© 2017, ceo david simonsen, censec homeland security...2017/11/15 · • grøstl, in sha-3 final...
TRANSCRIPT
© 2017, CEO David Simonsen, CenSec Homeland Security
About DencryptDynamic
Encryption
User friendlyDanish
Founded in 2013 Danish company Dynamic Encryption (patent pending)
Reference customers:Danish Defence, NATO
© 2017
Product categories
• Dencrypt Communications Solution (Dencrypt Talk + Dencrypt Server System)
• Dencrypt Core (software-integration)
• Proprietary algorithm development
© 2017
From knowledge to value
From knowledge to value
Idea (worthless)
From knowledge to value
Idea (worthless)
+ Problem (worthless)
From knowledge to value
Idea (worthless)
+ Problem (worthless)
--> Product (value)
From knowledge to value
Dynamic Encryption
Idea (worthless)
+ Problem (worthless)
--> Product (value)
From knowledge to value
Dynamic Encryption
+ Unsecure infrastructure encryption mono-culture
Idea (worthless)
+ Problem (worthless)
--> Product (value)
From knowledge to value
Dynamic Encryption
+ Unsecure infrastructure encryption mono-culture
--> Feeling of confidence
Idea (worthless)
+ Problem (worthless)
--> Product (value)
Dencrypt Talk in pictures
iPhoneApp
Phone book
User chosen Calling Authenticating
© 2017
NATO NCI innovation award, NITEC17, Ottawa
© 2017
Professor Lars Ramkilde Knudsen
• Serpent, in AES competition final • DEAL, also in AES-final (not submitted by LRK) • Present, ISO/IEC 29192-2:2012 • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash, ISO-standard hash-function
© 2017
Dynamic Encryption Principle
© 2017
Dynamic Encryption- New key for each session- New algorithm for each session
Inner algorithm (AES / national algorithm)
Moving target defenceDynamic versus static algorithmAnti-cryptanalysis measure
AES-author vurderer Dynamic Encryption
Vincent Rijmen, co-inventor of the AESencryption standard
© 2017
Opinion on Dynamic Encryption
Vincent Rijmen
May 22, 2017
Dynamic Encryption [1] is proposed by Knudsen as a method to strengthen the securityof a cryptosystem against mathematical cryptanalysis. The core idea of the method is thefollowing. The encryption function consists of a base cipher together with a dynamicencryption layer which is generated at random at the beginning of the encryption process.
Although at first sight the approach of Dynamic Encryption might violate Kerckhoffs’principle —which has to be satisfied by any modern cryptosystem—, this does not nec-essarily have to be the case. If each of the possible ciphers is secure by itself, and wouldremain secure even if its description would be known to the adversary, then Kerckhoffs’principle remains satisfied.
There are different ways to realise Dynamic Encryption in practice. The realisationsproposed in [1, 2] all start from one base cipher or a small set of base ciphers. They cascadesome ciphers in variable order, cascade one cipher with parts from other ciphers or withan extra layer with a definition that depends on the key, or they modify some componentsfrom a base cipher, e.g. the S-box of AES. All these realisations guarantee that the securityof dynamic encryption against cryptanalysis is at least the security of the base cipher.
We conclude that the method of dynamic encryption is sound and secure according tothe state of art in cryptology.
References
[1] Lars R. Knudsen. Dynamic Encryption. Journal of Cyber Security, Vol. 3, 357-370,2015.
[2] Dencrypt. Dynamic Encryption Reference code.
Vincent Rijmen, professor at University of Leuven, Belgium, is the author of the Advanced Encryption Standard (AES), the world’s de facto standard for strong encryption.
Dencrypt Core
© 2017Dynamic Encryption integration library for easy system integration (SW + HW)
Invitation to collaboration