symmetric key encryption new approach
DESCRIPTION
TRANSCRIPT
![Page 1: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/1.jpg)
To The World of Data SecurityWith Encryption Technology
Based on 1024bit symmetric key encryption standard
New Approach
![Page 2: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/2.jpg)
Today we‘ll talk about “Symmetric Key Encryption”differently than we are used to.
![Page 3: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/3.jpg)
Today we‘ll talk about “Symmetric Key Encryption”differently than we are used to.
OK, Do I need
special Knowledge
for that?
![Page 4: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/4.jpg)
No No…
Not at a
ll
Today we‘ll talk about “Symmetric Key Encryption”differently than we are used to.
OK, Do I need
special Knowledge
for that?
![Page 5: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/5.jpg)
What we can tell
you about this
procedure...
![Page 6: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/6.jpg)
It’s….
![Page 7: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/7.jpg)
Unique
It’s….
![Page 8: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/8.jpg)
Secured
It’s….
![Page 9: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/9.jpg)
Real fast
It’s….
![Page 10: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/10.jpg)
Easy to use
It’s….
![Page 11: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/11.jpg)
...and when there is any critical information...
![Page 12: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/12.jpg)
We're at your
finger tips…
http://www.clape.io/
http://www.asthaitsolutions.com/
![Page 13: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/13.jpg)
Now it’s time to get a ride of our
“Symmetric Key Encryption Procedure”
![Page 14: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/14.jpg)
Ready?
![Page 15: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/15.jpg)
Let’s go…
![Page 16: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/16.jpg)
Let’s go…
ONE thing we can
Deliver during the
journey
![Page 17: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/17.jpg)
... it‘s this ...
![Page 18: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/18.jpg)
Re-Consider The Technology
Which YOU are using
Right now
![Page 19: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/19.jpg)
Let us Revise the History at a glance
![Page 20: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/20.jpg)
• Originally developed by IBM in 1970s, later adopted by U.S. government in 1977
• Encryption of 64-bit plaintext using a 56-bit key
![Page 21: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/21.jpg)
• Relatively inexpensive to implement in hardware and widely available
• Largest users: financial transactions, PIN code generation, etc.
![Page 22: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/22.jpg)
We‘ll tell you about
3 things today.
![Page 23: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/23.jpg)
Current Tends Our Message New approach
![Page 24: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/24.jpg)
Current Tends
![Page 25: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/25.jpg)
Using Block Ciphers
• Encrypt a group of plaintext as one block and produces a block of cipher text
![Page 26: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/26.jpg)
Latest ParametersBlock size: minimum 128 bits, 256
Key size: 128, 192, 256 bits
![Page 27: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/27.jpg)
Disadvantages:
• Slowness of encryption Error propagation
![Page 28: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/28.jpg)
• Needs to be maintained
Disadvantages:
• Slowness of encryption Error propagation
![Page 29: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/29.jpg)
• High costs
• Needs to be maintained
Disadvantages:
• Slowness of encryption Error propagation
![Page 30: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/30.jpg)
• Compatibility• High costs
• Needs to be maintained
Disadvantages:
• Slowness of encryption Error propagation
![Page 31: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/31.jpg)
• Time consuming for the computer
• Compatibility• High costs
• Needs to be maintained
Disadvantages:
• Slowness of encryption Error propagation
![Page 32: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/32.jpg)
... Above all of those ...
![Page 33: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/33.jpg)
Our Message is…
![Page 34: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/34.jpg)
You may’ve to face
ATTACKS Like….
![Page 35: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/35.jpg)
…Recent attacks on existing workhorse algorithms
http://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show-mathematically-crackable-flaws-in-common-web-encryption/
http://arstechnica.com/security/2013/02/lucky-thirteen-attack-snarfs-cookies-protected-by-ssl-encryption/
http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
http://www.isg.rhul.ac.uk/~kp/padding.pdf
http://www.pcworld.com/article/2036563/livingsocials-breach-draws-advice-from-security-experts.html/
![Page 36: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/36.jpg)
For over coming all the obstacles on the path
![Page 37: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/37.jpg)
You must have to adopt…
![Page 38: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/38.jpg)
Our new approach
![Page 39: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/39.jpg)
Now it’s “SHOW TIME” for our New Approach….
![Page 40: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/40.jpg)
And that is….
Now it’s “SHOW TIME” for our New Approach….
![Page 41: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/41.jpg)
Our Innovation
![Page 42: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/42.jpg)
Our Innovation
Our Technology
![Page 43: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/43.jpg)
Our Innovation
Our Technology
Our cipher design principle
![Page 44: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/44.jpg)
Our Innovation
Our Technology
…And Speed Comparison of our
Our cipher design principle
Encryption algorithms Technology
![Page 45: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/45.jpg)
Our Innovation
![Page 46: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/46.jpg)
Our Innovation
Based on our own patent We have invented a New 1024 bit Symmetric Key Encryption Standard Entitled as…
![Page 47: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/47.jpg)
“A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC
COMMUNICATIONS.”
http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2011/pat_arch_122011/official_journal_02122011_part_i.pdf
htt p://ip india.n ic.in/ipr/patent/journal_archieve/journal_2012/pat_arch_082012/offi cial_ journal_24082012_part_ i.pdf
http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2012/pat_arch_082012/official_journal_24082012_part_i.pdf
htt p://appft .uspto.gov/netacgi/nph-Parser?Sect1=PTO 1& Sect2=H ITO FF& d=PG 01& p=1& u=% 2Fnetahtm l% 2FPTO % 2Fsrchnum .htm l& r=1& f=G & l=50& s1=% 2220130028419% 22.PG N R .& O S=D N /20130028419& RS=D N /20130028419
http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220130028419%22.PGNR.&OS=DN/20130028419&RS=DN/20130028419
![Page 48: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/48.jpg)
Our TechnologyThe mechanism :
![Page 49: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/49.jpg)
Our crypto procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key.
Our TechnologyThe mechanism :
![Page 50: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/50.jpg)
Our crypto procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key.
Our TechnologyThe mechanism :
And Other than that…
![Page 51: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/51.jpg)
•The technology a basic building block, which encrypts / decrypts a fixed size block of data.
Our Technology
![Page 52: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/52.jpg)
•The technology a basic building block, which encrypts / decrypts a fixed size block of data.
Our Technology
•To use these in practice, we usually need to handle arbitrary amount of data
![Page 53: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/53.jpg)
•The technology a basic building block, which encrypts / decrypts a fixed size block of data.
Our Technology
•To use these in practice, we usually need to handle arbitrary amount of data
•The data may be available in advance, (in which case a block mode is appropriate).
![Page 54: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/54.jpg)
…Now you can say…
![Page 55: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/55.jpg)
Unique
It’s Truly…
![Page 56: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/56.jpg)
Our cipher design principle
![Page 57: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/57.jpg)
Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.
![Page 58: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/58.jpg)
Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.
•Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.
![Page 59: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/59.jpg)
Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.
•Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.
•responsibility of securing the password/Cipher Key of the user rests on the Encryption Technology.
![Page 60: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/60.jpg)
Our cipher design principle•It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.
•Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.
•responsibility of securing the password/Cipher Key of the user rests on the Encryption Technology.
•There is no need for using salts/pass phrases in this technology for strengthening the password
![Page 61: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/61.jpg)
So our cipher design
principle is..
![Page 62: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/62.jpg)
So our cipher design
principle is..
Secured
![Page 63: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/63.jpg)
Now it’s time to compare The Speed of our
Encryption algorithms Technology
![Page 64: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/64.jpg)
Based on some scrutiny and cryptanalysis, We are confident that our encryption standard will survive this process and shall eventually become a new standard.
![Page 65: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/65.jpg)
Based on some scrutiny and cryptanalysis, We are confident that our encryption standard will survive this process and shall eventually become a new standard.
Let see some examples….
![Page 66: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/66.jpg)
Before we start, we’ve to
clarify some thing & that
is….
![Page 67: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/67.jpg)
Specifications of Hardware components utilized to make the under mentioned speed
comparison test :
![Page 68: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/68.jpg)
•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM
Specifications of Hardware components utilized to make the under mentioned speed
comparison test :
![Page 69: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/69.jpg)
•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM
Specifications of Hardware components utilized to make the under mentioned speed
comparison test :
•Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.
![Page 70: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/70.jpg)
•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM
Specifications of Hardware components utilized to make the under mentioned speed
comparison test :
•Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.
• All the tests have been performed on commonly known file formats
![Page 71: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/71.jpg)
•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM
Specifications of Hardware components utilized to make the under mentioned speed
comparison test :
•Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.
• All the tests have been performed on commonly known file formats
•All the test reports are based on base 64 encoding.
![Page 72: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/72.jpg)
Time Comparison of encryption algorithms
![Page 73: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/73.jpg)
Decryption Time (in milliseconds)
![Page 74: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/74.jpg)
Encryption Time (in milliseconds) for
Medium Sized files
![Page 75: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/75.jpg)
Decryption Time (in milliseconds) for Medium
Sized files
![Page 76: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/76.jpg)
Encryption Time (in milliseconds)
![Page 77: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/77.jpg)
Decryption Time (in milliseconds)
![Page 78: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/78.jpg)
Graph showing time consumption for encryption with different key sizes for a
specific size of File (7.14MB) on our technology.
![Page 79: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/79.jpg)
Graph showing time consumption for decryption with different key sizes for a
specific size of File (7.14MB) on our technology.
![Page 80: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/80.jpg)
Graph showing time consumption for encryption with different key sizes for a
specific size of File (694 Kb) on our technology.
![Page 81: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/81.jpg)
Graph showing time consumption for decryption with different key sizes for a
specific size of File (694 Kb) on our technology.
![Page 82: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/82.jpg)
So….
![Page 83: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/83.jpg)
Real fast & Secured
It’s….
![Page 84: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/84.jpg)
If you Consider its Compatibility
![Page 85: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/85.jpg)
If you Consider its Compatibility
• It is compatible to XP, Vista, Windows 7, Linux & Mac (OSX). Platforms.
![Page 86: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/86.jpg)
And obviously it’s….
![Page 87: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/87.jpg)
Easy to use
And obviously it’s….
![Page 88: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/88.jpg)
Now It’s right time to Re-Consider
The Technology
Which YOU
are using
Right now
![Page 89: Symmetric key encryption new approach](https://reader034.vdocuments.net/reader034/viewer/2022051513/5479eb60b4af9fc9158b4989/html5/thumbnails/89.jpg)
Acknowledgement:- International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010} International Business Information Management Association (IBIMA).