SlideShare a Scribd company logo
1 of 89
To The World of Data Security
With Encryption Technology
Based on 1024bit symmetric key encryption standard
New Approach
Today we‘ll talk
about “Symmetric Key
Encryption”
differently than we
are used to.
Today we‘ll talk
about “Symmetric Key
Encryption”
differently than we
are used to.
OK, Do I need
special Knowledge
for that?
Today we‘ll talk
about “Symmetric Key
Encryption”
differently than we
are used to.
OK, Do I need
special Knowledge
for that?
What we can tell
you about this
procedure...
It’s….
Unique
It’s….
Secured
It’s….
Real fast
It’s….
Easy to use
It’s….
...and when there is any
critical information...
We're at your
finger tips…
http://www.clape.io/
http://www.asthaitsolutions.com/
Now it’s time to get a ride
of our
“Symmetric Key
Encryption Procedure”
Ready?
Let’s go…
Let’s go…
... it‘s this ...
Re-Consider
The Technology
Which YOU are using
Right now
Let us Revise the History
at a glance
• Originally developed by IBM in
1970s, later adopted by U.S.
government in 1977
• Encryption of 64-bit plaintext using
a 56-bit key
• Relatively inexpensive to
implement in hardware and
widely available
• Largest users: financial
transactions, PIN code
generation, etc.
We‘ll tell you about
3 things today.
Current Tends Our Message New approach
Current
Tends
Using Block Ciphers
• Encrypt a group of plaintext as
one block and produces a block
of cipher text
Latest Parameters
Block size: minimum 128 bits, 256
Key size: 128, 192, 256 bits
Disadvantages:
• Slowness of encryption Error
propagation
• Needs to be maintained
Disadvantages:
• Slowness of encryption Error
propagation
• High costs
• Needs to be maintained
Disadvantages:
• Slowness of encryption Error
propagation
• Compatibility
• High costs
• Needs to be maintained
Disadvantages:
• Slowness of encryption Error
propagation
• Time consuming for the computer
• Compatibility
• High costs
• Needs to be maintained
Disadvantages:
• Slowness of encryption Error
propagation
... Above all of those ...
Our
Message
is…
You may’ve to face
ATTACKS Like….
…Recent attacks on existing
workhorse algorithms
http://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show-
mathematically-crackable-flaws-in-common-web-encryption/
http://arstechnica.com/security/2013/02/lucky-thirteen-attack-snarfs-cookies-
protected-by-ssl-encryption/
http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
http://www.isg.rhul.ac.uk/~kp/padding.pdf
http://www.pcworld.com/article/2036563/livingsocials-breach-draws-advice-
from-security-experts.html/
For over coming all the
obstacles on the path
You must have to
adopt…
Our new
approach
Now it’s “SHOW TIME” for
our New Approach….
And that is….
Now it’s “SHOW TIME” for
our New Approach….
Our Innovation
Our Innovation
Our Technology
Our Innovation
Our Technology
Our cipher design principle
Our Innovation
Our Technology
…And Speed Comparison of our
Our cipher design principle
Encryption algorithms Technology
Our Innovation
Our Innovation
Based on our own patent We have invented a
New 1024 bit Symmetric Key Encryption
Standard Entitled as…
“A SYSTEM AND A METHOD FOR USE IN A
SYMMETRIC KEY CRYPTOGRAPHIC
COMMUNICATIONS.”
http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2011/pat_arc
h_122011/official_journal_02122011_part_i.pdf
http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2012/p
at_arch_082012/official_journal_24082012_part_i.pdf
http://appft.uspto.gov/netacgi/nph-
Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml
%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220130028419%2
2.PGNR.&OS=DN/20130028419&RS=DN/20130028419
Our Technology
The mechanism :
Our crypto procedure seeks to make the
statistical relationship between the plain text
and the cipher text as complex as possible to
prevent attempts to derive the cipher key.
Our Technology
The mechanism :
Our crypto procedure seeks to make the
statistical relationship between the plain text
and the cipher text as complex as possible to
prevent attempts to derive the cipher key.
Our Technology
The mechanism :
And Other than that…
•The technology a basic building block, which
encrypts / decrypts a fixed size block of data.
Our Technology
•The technology a basic building block, which
encrypts / decrypts a fixed size block of data.
Our Technology
•To use these in practice, we usually need to handle
arbitrary amount of data
•The technology a basic building block, which
encrypts / decrypts a fixed size block of data.
Our Technology
•To use these in practice, we usually need to handle
arbitrary amount of data
•The data may be available in advance, (in which
case a block mode is appropriate).
…Now you can say…
Unique
It’s
Truly…
Our cipher design principle
Our cipher design principle
•It encrypts 1024 bit blocks of plain text with the Cipher Key
having same size of bits, using appropriate iterations.
Our cipher design principle
•It encrypts 1024 bit blocks of plain text with the Cipher Key
having same size of bits, using appropriate iterations.
•Through this procedure the password key is being made into
a 1024 bit block size and put into our own encryption
algorithm to generate a chunk of cipher text of same bit size.
Our cipher design principle
•It encrypts 1024 bit blocks of plain text with the Cipher Key
having same size of bits, using appropriate iterations.
•Through this procedure the password key is being made into
a 1024 bit block size and put into our own encryption
algorithm to generate a chunk of cipher text of same bit size.
•responsibility of securing the password/Cipher Key of the
user rests on the Encryption Technology.
Our cipher design principle
•It encrypts 1024 bit blocks of plain text with the Cipher Key
having same size of bits, using appropriate iterations.
•Through this procedure the password key is being made into
a 1024 bit block size and put into our own encryption
algorithm to generate a chunk of cipher text of same bit size.
•responsibility of securing the password/Cipher Key of the
user rests on the Encryption Technology.
•There is no need for using salts/pass phrases in this
technology for strengthening the password
So our cipher design
principle is..
So our cipher design
principle is..
Secured
Now it’s time to compare
The Speed of our
Encryption algorithms
Technology
Based on some scrutiny and cryptanalysis,
We are confident that our encryption
standard will survive this process and shall
eventually become a new standard.
Based on some scrutiny and cryptanalysis,
We are confident that our encryption
standard will survive this process and shall
eventually become a new standard.
Let see some examples….
Before we start, we’ve to
clarify some thing & that
is….
Specifications of Hardware components
utilized to make the under mentioned speed
comparison test :
•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB
RAM
Specifications of Hardware components
utilized to make the under mentioned speed
comparison test :
•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB
RAM
Specifications of Hardware components
utilized to make the under mentioned speed
comparison test :
•Energy consumption: It is observed that 600 times of encryption
of a 5 MB file utilizes only 20% (approx) of the available Battery
power of the laptop.
•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB
RAM
Specifications of Hardware components
utilized to make the under mentioned speed
comparison test :
•Energy consumption: It is observed that 600 times of encryption
of a 5 MB file utilizes only 20% (approx) of the available Battery
power of the laptop.
• All the tests have been performed on commonly known file
formats
•i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB
RAM
Specifications of Hardware components
utilized to make the under mentioned speed
comparison test :
•Energy consumption: It is observed that 600 times of encryption
of a 5 MB file utilizes only 20% (approx) of the available Battery
power of the laptop.
• All the tests have been performed on commonly known file
formats
•All the test reports are based on base 64 encoding.
Time Comparison of encryption
algorithms
Decryption Time (in milliseconds)
Encryption Time
(in milliseconds) for Medium
Sized files
Decryption Time (in milliseconds)
for Medium Sized files
Encryption Time
(in milliseconds)
Decryption Time
(in milliseconds)
Graph showing time consumption for encryption
with different key sizes for a specific size of File
(7.14MB) on our technology.
Graph showing time consumption for decryption
with different key sizes for a specific size of File
(7.14MB) on our technology.
Graph showing time consumption for encryption
with different key sizes for a specific size of File
(694 Kb) on our technology.
Graph showing time consumption for decryption
with different key sizes for a specific size of File (694
Kb) on our technology.
So….
Real fast & Secured
It’s….
If you Consider its Compatibility
If you Consider its Compatibility
• It is compatible to XP, Vista, Windows 7,
Linux & Mac (OSX). Platforms.
And obviously it’s….
Easy to use
And obviously it’s….
Now It’s right time to
Re-Consider
The Technology
Which YOU
are using
Right now
Acknowledgement:-
International Journal of Network Security, Vol.10, No.3, PP.213 {219,
May 2010}
International Business Information Management Association (IBIMA).

More Related Content

Similar to Symmetric key encryption new approach

Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric keymdhar123
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryptionmdhar123
 
Comparative analysis of algorithms
Comparative analysis of algorithmsComparative analysis of algorithms
Comparative analysis of algorithmsYisal Khan
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaSusmitha Reddy
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryPriyanka Aash
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels PresentationRichard Blech
 
Voice recognition security systems
Voice recognition security systemsVoice recognition security systems
Voice recognition security systemsSandeep Kumar
 
How to hide your browser 0-days
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-daysZoltan Balazs
 
Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)Sqreen
 
"Crypto wallets security. For developers", Julia Potapenko
"Crypto wallets security. For developers", Julia Potapenko"Crypto wallets security. For developers", Julia Potapenko
"Crypto wallets security. For developers", Julia PotapenkoFwdays
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...IRJET Journal
 
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...MongoDB
 
Comparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption AlgorithmComparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption AlgorithmKhubaib Ahmad Kunjahi
 
Transparent Data Encryption in PostgreSQL and Integration with Key Management...
Transparent Data Encryption in PostgreSQL and Integration with Key Management...Transparent Data Encryption in PostgreSQL and Integration with Key Management...
Transparent Data Encryption in PostgreSQL and Integration with Key Management...Masahiko Sawada
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017FRSecure
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Jim Manico
 
Developer's Guide to JavaScript and Web Cryptography
Developer's Guide to JavaScript and Web CryptographyDeveloper's Guide to JavaScript and Web Cryptography
Developer's Guide to JavaScript and Web CryptographyKevin Hakanson
 

Similar to Symmetric key encryption new approach (20)

Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
Comparative analysis of algorithms
Comparative analysis of algorithmsComparative analysis of algorithms
Comparative analysis of algorithms
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec glory
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels Presentation
 
Voice recognition security systems
Voice recognition security systemsVoice recognition security systems
Voice recognition security systems
 
How to hide your browser 0-days
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-days
 
Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)
 
"Crypto wallets security. For developers", Julia Potapenko
"Crypto wallets security. For developers", Julia Potapenko"Crypto wallets security. For developers", Julia Potapenko
"Crypto wallets security. For developers", Julia Potapenko
 
Help Doctor, my application is an onion!
Help Doctor, my application is an onion!Help Doctor, my application is an onion!
Help Doctor, my application is an onion!
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
 
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
 
Comparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption AlgorithmComparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption Algorithm
 
Transparent Data Encryption in PostgreSQL and Integration with Key Management...
Transparent Data Encryption in PostgreSQL and Integration with Key Management...Transparent Data Encryption in PostgreSQL and Integration with Key Management...
Transparent Data Encryption in PostgreSQL and Integration with Key Management...
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5
 
Developer's Guide to JavaScript and Web Cryptography
Developer's Guide to JavaScript and Web CryptographyDeveloper's Guide to JavaScript and Web Cryptography
Developer's Guide to JavaScript and Web Cryptography
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Symmetric key encryption new approach

  • 1. To The World of Data Security With Encryption Technology Based on 1024bit symmetric key encryption standard New Approach
  • 2. Today we‘ll talk about “Symmetric Key Encryption” differently than we are used to.
  • 3. Today we‘ll talk about “Symmetric Key Encryption” differently than we are used to. OK, Do I need special Knowledge for that?
  • 4. Today we‘ll talk about “Symmetric Key Encryption” differently than we are used to. OK, Do I need special Knowledge for that?
  • 5. What we can tell you about this procedure...
  • 11. ...and when there is any critical information...
  • 12. We're at your finger tips… http://www.clape.io/ http://www.asthaitsolutions.com/
  • 13. Now it’s time to get a ride of our “Symmetric Key Encryption Procedure”
  • 19. Let us Revise the History at a glance
  • 20. • Originally developed by IBM in 1970s, later adopted by U.S. government in 1977 • Encryption of 64-bit plaintext using a 56-bit key
  • 21. • Relatively inexpensive to implement in hardware and widely available • Largest users: financial transactions, PIN code generation, etc.
  • 22. We‘ll tell you about 3 things today.
  • 23. Current Tends Our Message New approach
  • 25. Using Block Ciphers • Encrypt a group of plaintext as one block and produces a block of cipher text
  • 26. Latest Parameters Block size: minimum 128 bits, 256 Key size: 128, 192, 256 bits
  • 27. Disadvantages: • Slowness of encryption Error propagation
  • 28. • Needs to be maintained Disadvantages: • Slowness of encryption Error propagation
  • 29. • High costs • Needs to be maintained Disadvantages: • Slowness of encryption Error propagation
  • 30. • Compatibility • High costs • Needs to be maintained Disadvantages: • Slowness of encryption Error propagation
  • 31. • Time consuming for the computer • Compatibility • High costs • Needs to be maintained Disadvantages: • Slowness of encryption Error propagation
  • 32. ... Above all of those ...
  • 34. You may’ve to face ATTACKS Like….
  • 35. …Recent attacks on existing workhorse algorithms http://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show- mathematically-crackable-flaws-in-common-web-encryption/ http://arstechnica.com/security/2013/02/lucky-thirteen-attack-snarfs-cookies- protected-by-ssl-encryption/ http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/ http://www.isg.rhul.ac.uk/~kp/padding.pdf http://www.pcworld.com/article/2036563/livingsocials-breach-draws-advice- from-security-experts.html/
  • 36. For over coming all the obstacles on the path
  • 37. You must have to adopt…
  • 39. Now it’s “SHOW TIME” for our New Approach….
  • 40. And that is…. Now it’s “SHOW TIME” for our New Approach….
  • 43. Our Innovation Our Technology Our cipher design principle
  • 44. Our Innovation Our Technology …And Speed Comparison of our Our cipher design principle Encryption algorithms Technology
  • 46. Our Innovation Based on our own patent We have invented a New 1024 bit Symmetric Key Encryption Standard Entitled as…
  • 47. “A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC COMMUNICATIONS.” http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2011/pat_arc h_122011/official_journal_02122011_part_i.pdf http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2012/p at_arch_082012/official_journal_24082012_part_i.pdf http://appft.uspto.gov/netacgi/nph- Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml %2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220130028419%2 2.PGNR.&OS=DN/20130028419&RS=DN/20130028419
  • 49. Our crypto procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key. Our Technology The mechanism :
  • 50. Our crypto procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key. Our Technology The mechanism : And Other than that…
  • 51. •The technology a basic building block, which encrypts / decrypts a fixed size block of data. Our Technology
  • 52. •The technology a basic building block, which encrypts / decrypts a fixed size block of data. Our Technology •To use these in practice, we usually need to handle arbitrary amount of data
  • 53. •The technology a basic building block, which encrypts / decrypts a fixed size block of data. Our Technology •To use these in practice, we usually need to handle arbitrary amount of data •The data may be available in advance, (in which case a block mode is appropriate).
  • 54. …Now you can say…
  • 56. Our cipher design principle
  • 57. Our cipher design principle •It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations.
  • 58. Our cipher design principle •It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations. •Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size.
  • 59. Our cipher design principle •It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations. •Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size. •responsibility of securing the password/Cipher Key of the user rests on the Encryption Technology.
  • 60. Our cipher design principle •It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations. •Through this procedure the password key is being made into a 1024 bit block size and put into our own encryption algorithm to generate a chunk of cipher text of same bit size. •responsibility of securing the password/Cipher Key of the user rests on the Encryption Technology. •There is no need for using salts/pass phrases in this technology for strengthening the password
  • 61. So our cipher design principle is..
  • 62. So our cipher design principle is.. Secured
  • 63. Now it’s time to compare The Speed of our Encryption algorithms Technology
  • 64. Based on some scrutiny and cryptanalysis, We are confident that our encryption standard will survive this process and shall eventually become a new standard.
  • 65. Based on some scrutiny and cryptanalysis, We are confident that our encryption standard will survive this process and shall eventually become a new standard. Let see some examples….
  • 66. Before we start, we’ve to clarify some thing & that is….
  • 67. Specifications of Hardware components utilized to make the under mentioned speed comparison test :
  • 68. •i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM Specifications of Hardware components utilized to make the under mentioned speed comparison test :
  • 69. •i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM Specifications of Hardware components utilized to make the under mentioned speed comparison test : •Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.
  • 70. •i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM Specifications of Hardware components utilized to make the under mentioned speed comparison test : •Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop. • All the tests have been performed on commonly known file formats
  • 71. •i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM Specifications of Hardware components utilized to make the under mentioned speed comparison test : •Energy consumption: It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop. • All the tests have been performed on commonly known file formats •All the test reports are based on base 64 encoding.
  • 72. Time Comparison of encryption algorithms
  • 73. Decryption Time (in milliseconds)
  • 74. Encryption Time (in milliseconds) for Medium Sized files
  • 75. Decryption Time (in milliseconds) for Medium Sized files
  • 78. Graph showing time consumption for encryption with different key sizes for a specific size of File (7.14MB) on our technology.
  • 79. Graph showing time consumption for decryption with different key sizes for a specific size of File (7.14MB) on our technology.
  • 80. Graph showing time consumption for encryption with different key sizes for a specific size of File (694 Kb) on our technology.
  • 81. Graph showing time consumption for decryption with different key sizes for a specific size of File (694 Kb) on our technology.
  • 83. Real fast & Secured It’s….
  • 84. If you Consider its Compatibility
  • 85. If you Consider its Compatibility • It is compatible to XP, Vista, Windows 7, Linux & Mac (OSX). Platforms.
  • 87. Easy to use And obviously it’s….
  • 88. Now It’s right time to Re-Consider The Technology Which YOU are using Right now
  • 89. Acknowledgement:- International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010} International Business Information Management Association (IBIMA).