© 2017, ceo david simonsen, censec homeland security...2017/11/15  · • grøstl, in sha-3 final...

17
© 2017, CEO David Simonsen, CenSec Homeland Security

Upload: others

Post on 27-Apr-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

© 2017, CEO David Simonsen, CenSec Homeland Security

Page 2: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

About DencryptDynamic

Encryption

User friendlyDanish

Founded in 2013 Danish company Dynamic Encryption (patent pending)

Reference customers:Danish Defence, NATO

© 2017

Page 3: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

Product categories

• Dencrypt Communications Solution (Dencrypt Talk + Dencrypt Server System)

• Dencrypt Core (software-integration)

• Proprietary algorithm development

© 2017

Page 4: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

From knowledge to value

Page 5: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

From knowledge to value

Idea (worthless)

Page 6: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

From knowledge to value

Idea (worthless)

+ Problem (worthless)

Page 7: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

From knowledge to value

Idea (worthless)

+ Problem (worthless)

--> Product (value)

Page 8: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

From knowledge to value

Dynamic Encryption

Idea (worthless)

+ Problem (worthless)

--> Product (value)

Page 9: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

From knowledge to value

Dynamic Encryption

+ Unsecure infrastructure encryption mono-culture

Idea (worthless)

+ Problem (worthless)

--> Product (value)

Page 10: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

From knowledge to value

Dynamic Encryption

+ Unsecure infrastructure encryption mono-culture

--> Feeling of confidence

Idea (worthless)

+ Problem (worthless)

--> Product (value)

Page 11: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

Dencrypt Talk in pictures

iPhoneApp

Phone book

User chosen Calling Authenticating

© 2017

Page 12: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

NATO NCI innovation award, NITEC17, Ottawa

© 2017

Page 13: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

Professor Lars Ramkilde Knudsen

• Serpent, in AES competition final • DEAL, also in AES-final (not submitted by LRK) • Present, ISO/IEC 29192-2:2012 • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash, ISO-standard hash-function

© 2017

Page 14: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

Dynamic Encryption Principle

© 2017

Dynamic Encryption- New key for each session- New algorithm for each session

Inner algorithm (AES / national algorithm)

Moving target defenceDynamic versus static algorithmAnti-cryptanalysis measure

Page 15: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

AES-author vurderer Dynamic Encryption

Vincent Rijmen, co-inventor of the AESencryption standard

© 2017

Opinion on Dynamic Encryption

Vincent Rijmen

May 22, 2017

Dynamic Encryption [1] is proposed by Knudsen as a method to strengthen the securityof a cryptosystem against mathematical cryptanalysis. The core idea of the method is thefollowing. The encryption function consists of a base cipher together with a dynamicencryption layer which is generated at random at the beginning of the encryption process.

Although at first sight the approach of Dynamic Encryption might violate Kerckhoffs’principle —which has to be satisfied by any modern cryptosystem—, this does not nec-essarily have to be the case. If each of the possible ciphers is secure by itself, and wouldremain secure even if its description would be known to the adversary, then Kerckhoffs’principle remains satisfied.

There are different ways to realise Dynamic Encryption in practice. The realisationsproposed in [1, 2] all start from one base cipher or a small set of base ciphers. They cascadesome ciphers in variable order, cascade one cipher with parts from other ciphers or withan extra layer with a definition that depends on the key, or they modify some componentsfrom a base cipher, e.g. the S-box of AES. All these realisations guarantee that the securityof dynamic encryption against cryptanalysis is at least the security of the base cipher.

We conclude that the method of dynamic encryption is sound and secure according tothe state of art in cryptology.

References

[1] Lars R. Knudsen. Dynamic Encryption. Journal of Cyber Security, Vol. 3, 357-370,2015.

[2] Dencrypt. Dynamic Encryption Reference code.

Vincent Rijmen, professor at University of Leuven, Belgium, is the author of the Advanced Encryption Standard (AES), the world’s de facto standard for strong encryption.

Page 16: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

Dencrypt Core

© 2017Dynamic Encryption integration library for easy system integration (SW + HW)

Page 17: © 2017, CEO David Simonsen, CenSec Homeland Security...2017/11/15  · • Grøstl, in SHA-3 final • Prince, light-weight cipher • MacDES, Mac-algorithm based on DES • CodeHash,

Invitation to collaboration