encryption symmetric key new approach

18
Our innovations We have invented a New Symmetric Key Encryption Standard and has filed for patenting in Indian Patent Office vide application no.0992/KOL/2011 dated. 26.07.2011 in Kolkata Patent Office Entitled as “A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC COMMUNICATIONS.” And was published in the Indian Patent Office Journal on 2nd December 2011. Moreover we have applied for patenting in USPTO vide application no 13/557112 date 24.07.2012 and was published in USPTO Journal on 31.12.2012 We have also invented a Asymmetric Key cryptographic Standard and has filed for patenting in Indian Patent Office (I.P.O Kolkata)vide application no.446/KOL/2012 dated. 19/04/2012 in Kolkata Patent Office Entitled as “METHOD FOR ESTABLISHING SECURE COMMUNICATION IN A NETWORK AND SYSTEM THEREOF” And was published in the Indian Patent Office(IPO) Journal on 24/08/2012

Upload: mdhar123

Post on 25-Jun-2015

476 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Encryption symmetric key new approach

Our innovations We have invented a New Symmetric Key Encryption Standard and has filed for patenting in Indian Patent Office vide application no.0992/KOL/2011 dated. 26.07.2011 in Kolkata Patent Office Entitled as “A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC COMMUNICATIONS.” And was published in the Indian Patent Office Journal on 2nd December 2011. Moreover we have applied for patenting in USPTO vide application no 13/557112 date 24.07.2012 and was published in USPTO Journal on 31.12.2012

We have also invented a Asymmetric Key cryptographic Standard and has filed for patenting in Indian Patent Office (I.P.O Kolkata)vide application no.446/KOL/2012 dated. 19/04/2012 in Kolkata Patent Office Entitled as “METHOD FOR ESTABLISHING SECURE COMMUNICATION IN A NETWORK AND SYSTEM THEREOF” And was published in the Indian Patent Office(IPO) Journal on 24/08/2012

Page 2: Encryption symmetric key new approach

Abstract of the Patent Application for Symmetric Key Encryption Standard

The present invention relates to a system and a method for secured transmission of data. The method comprises the steps of providing the data, generating a password or a key by a user, encrypting the data by the password or the key for plural number of times resulting plurality of cipher texts, sending plurality of the cipher texts and the password or key, and decrypting the cipher text by the password or the key. The system comprises input device means for providing the data, input device means for generating a password by a user, processor means encrypting the data by the password or key for plural number of times resulting plurality of cipher texts, means for sending the plurality of cipher texts and the password and means for decrypting the cipher text by the password or key.

Page 3: Encryption symmetric key new approach

Our TechnologyEvery block cipher involves a transformation

of a block of plain text into block of cipher text, where the transformation depends on the cipher key. The mechanism of our encryption procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key.

The technology a basic building block, which encrypts / decrypts a fixed size block of data. However to use these in practice, we usually need to handle arbitrary amount of data , which may be available in advance, (in which case a block mode is appropriate).

Page 4: Encryption symmetric key new approach

OUR CIPHER DESIGN PRINCIPLES :

It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations as may be required by any specific user to achieve maximum level of security.

Through this procedure the password key is being made into a 1024 bit block size and correspondingly a chunk of plain text of same bit size are being put into our own encryption algorithm to generate a chunk of cipher text.It is commonly believed that the strength of the Password much depends on the method how the encryption algorithm is deployed.

In practicality, it has been observed that the user doesn't always want to use password as long as needed for effective key generation.As such responsibility of securing the password/Cipher Key of the user rests on the Encryption Technology.

There is no need for using salts/pass phrases in this technology for strengthening the password what any common user tends to apply to achieve utmost security.

Page 5: Encryption symmetric key new approach

Recent attacks on existing workhorse algorithms

The recent attacks as evident in the following links provided herein:- 

http://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show-mathematically-crackable-flaws-in-common-web-encryption/

http://arstechnica.com/security/2013/02/lucky-thirteen-attack-snarfs-cookies-protected-by-ssl-encryption/

http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/

http://www.isg.rhul.ac.uk/~kp/padding.pdf

http://www.pcworld.com/article/2036563/livingsocials-breach-draws-advice-from-security-experts.html/

Page 6: Encryption symmetric key new approach

In this context of the persistent attacks

as described in the earlier page it is commonly

felt that if the world is to have a secure

reliable and easily available encryption

algorithm by the turn of the decade the world

needs several candidate symmetric Key

encryption algorithms now. These algorithms

have to be subjected to years of public

scrutiny and cryptanalysis. We are confident

that our encryption standard will survive this

process and shall eventually become a new

standard.

Our Goal :

Page 7: Encryption symmetric key new approach

Hardware used: i3 processor 2.10 GHz, 3GB RAM

and i3 processor, 2.20 GHz, 2GB RAM

Energy consumption : It is observed that 600 times

of encryption of a 5 MB file utilizes only 20% (approx)

of the available Battery power of the laptop.

All the tests have been performed on commonly

known file formats.

Specifications:

Page 8: Encryption symmetric key new approach

Time Comparison of encryption algorithms

Results are based on base 64 encoding

Page 9: Encryption symmetric key new approach

Decryption Time (in milliseconds)

Results are based on base 64 encoding

Page 10: Encryption symmetric key new approach

Encryption Time (in milliseconds) for Medium Size of file

Results are based on base 64 encoding

Page 11: Encryption symmetric key new approach

Decryption Time (in milliseconds) for Medium Size of file

Results are based on base 64 encoding

Page 12: Encryption symmetric key new approach

Encryption Time (in milliseconds)

Results are based on base 64 encoding

Page 13: Encryption symmetric key new approach

Decryption Time (in milliseconds)

Results are based on base 64 encoding

Page 14: Encryption symmetric key new approach

Graph showing time consumption for encryption with different key sizes for a specific size of File (7.14MB) on

our technology.Results are based on base 64 encoding

Page 15: Encryption symmetric key new approach

Graph showing time consumption for decryption with different key sizes for a specific size of File (7.14MB) on

our technology.Results are based on base 64 encoding

Page 16: Encryption symmetric key new approach

Graph showing time consumption for encryption with different key sizes for a specific size of File (694 Kb) on

our technology.

Results are based on base 64 encoding

Page 17: Encryption symmetric key new approach

Graph showing time consumption for decryption with different key sizes for a specific size of File (694 Kb) on

our technology.Results are based on base 64 encoding

Page 18: Encryption symmetric key new approach

THANK YOU

Acknowledgement:-International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010} International Business Information Management Association (IBIMA).