46. Our Innovation
Based on our own patent We have invented a
New 1024 bit Symmetric Key Encryption
Standard Entitled as…
47. “A SYSTEM AND A METHOD FOR USE IN A
SYMMETRIC KEY CRYPTOGRAPHIC
COMMUNICATIONS.”
http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2011/pat_arc
h_122011/official_journal_02122011_part_i.pdf
http://ipindia.nic.in/ipr/patent/journal_archieve/journal_2012/p
at_arch_082012/official_journal_24082012_part_i.pdf
http://appft.uspto.gov/netacgi/nph-
Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml
%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220130028419%2
2.PGNR.&OS=DN/20130028419&RS=DN/20130028419
49. Our crypto procedure seeks to make the
statistical relationship between the plain text
and the cipher text as complex as possible to
prevent attempts to derive the cipher key.
Our Technology
The mechanism :
50. Our crypto procedure seeks to make the
statistical relationship between the plain text
and the cipher text as complex as possible to
prevent attempts to derive the cipher key.
Our Technology
The mechanism :
And Other than that…
51. •The technology a basic building block, which
encrypts / decrypts a fixed size block of data.
Our Technology
52. •The technology a basic building block, which
encrypts / decrypts a fixed size block of data.
Our Technology
•To use these in practice, we usually need to handle
arbitrary amount of data
53. •The technology a basic building block, which
encrypts / decrypts a fixed size block of data.
Our Technology
•To use these in practice, we usually need to handle
arbitrary amount of data
•The data may be available in advance, (in which
case a block mode is appropriate).
57. Our cipher design principle
•It encrypts 1024 bit blocks of plain text with the Cipher Key
having same size of bits, using appropriate iterations.
58. Our cipher design principle
•It encrypts 1024 bit blocks of plain text with the Cipher Key
having same size of bits, using appropriate iterations.
•Through this procedure the password key is being made into
a 1024 bit block size and put into our own encryption
algorithm to generate a chunk of cipher text of same bit size.
59. Our cipher design principle
•It encrypts 1024 bit blocks of plain text with the Cipher Key
having same size of bits, using appropriate iterations.
•Through this procedure the password key is being made into
a 1024 bit block size and put into our own encryption
algorithm to generate a chunk of cipher text of same bit size.
•responsibility of securing the password/Cipher Key of the
user rests on the Encryption Technology.
60. Our cipher design principle
•It encrypts 1024 bit blocks of plain text with the Cipher Key
having same size of bits, using appropriate iterations.
•Through this procedure the password key is being made into
a 1024 bit block size and put into our own encryption
algorithm to generate a chunk of cipher text of same bit size.
•responsibility of securing the password/Cipher Key of the
user rests on the Encryption Technology.
•There is no need for using salts/pass phrases in this
technology for strengthening the password
63. Now it’s time to compare
The Speed of our
Encryption algorithms
Technology
64. Based on some scrutiny and cryptanalysis,
We are confident that our encryption
standard will survive this process and shall
eventually become a new standard.
65. Based on some scrutiny and cryptanalysis,
We are confident that our encryption
standard will survive this process and shall
eventually become a new standard.
Let see some examples….
68. •i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB
RAM
Specifications of Hardware components
utilized to make the under mentioned speed
comparison test :
69. •i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB
RAM
Specifications of Hardware components
utilized to make the under mentioned speed
comparison test :
•Energy consumption: It is observed that 600 times of encryption
of a 5 MB file utilizes only 20% (approx) of the available Battery
power of the laptop.
70. •i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB
RAM
Specifications of Hardware components
utilized to make the under mentioned speed
comparison test :
•Energy consumption: It is observed that 600 times of encryption
of a 5 MB file utilizes only 20% (approx) of the available Battery
power of the laptop.
• All the tests have been performed on commonly known file
formats
71. •i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB
RAM
Specifications of Hardware components
utilized to make the under mentioned speed
comparison test :
•Energy consumption: It is observed that 600 times of encryption
of a 5 MB file utilizes only 20% (approx) of the available Battery
power of the laptop.
• All the tests have been performed on commonly known file
formats
•All the test reports are based on base 64 encoding.