STRATEGIC ENCRYPTION

STRATEGIC ENCRYPTION
www.crypto-logica.com
2. SECURITY PROBLEMS & SOLUTION
Features of Crypto-Logica Key Exchange, Encryption and Hash
Future proof due to both ultimate security and ultimate speed
Unlimited key length (chosen by hardware/software embodiment)
Unlimited hash length (chosen by hardware/software embodiment)
Provable security against both quantum and classic computers
Brutal force security due to longer keys
Linear cryptanalysis security due to non-polynomial key finding
Differential cryptanalysis security without weak keys
Provable security of key exchange due to symmetric algorithms
Provable security of data encryption due to symmetric algorithms
Provable security of authentication due to symmetric algorithms
3. METHOD PROBLEMS & SOLUTION
Features of Crypto-Logica Key Exchange, Encryption and Hash
No complex operations for simple hardware/software embodiment
No matrix operations for simple hardware/software embodiment
No vector operations for simple hardware/software embodiment
No substitution (S) boxes for preventing side-channel attack
Simple non-linear arithmetic for simple embodiments
Simple design without a “trap door” preventing key finding
Family of algorithms for further development and customization
Optional unpublished algorithms for maximum top security
Customizable algorithms for government security
User adjustable parameters for mission-critical security
4. TECHNICAL PROBLEMS & SOLUTION
Features of Crypto-Logica Key Exchange, Encryption and Hash
Highest encryption speed (several Gbit/s) on a single CPU thread
Highest hashing speed (several Gbit/s) on a single CPU thread
Ultralow latency for easy plug-in into current and new designs
Small processing complexity for any hardware platform
Small memory size for immediate applications anywhere
Small memory bandwidth preventing memory bus bottleneck
Low power consumption for portable and unattended devices
Low heat dissipation for stealth and undercover operations
Small weight of platform hardware for portable and aerial devices
Small size of platform hardware for small devices
5. PRACTICAL PROBLEMS & SOLUTION
Features of Crypto-Logica Key Exchange, Encryption and Hash
Low cost platform hardware for massive deployment
Low cost platform software for massive deployment
Runs on any platform for installation on already deployed assets
Simple and fast interfacing with top level applications
Huge bit confusion by stream and block ciphers
Huge bit diffusion by block ciphers
Almost perfect randomness by stream and block ciphers
Integer arithmetic running on any platform
No multiplication for fast execution on general purpose processors
No division for fast execution on general purpose processors
6. CRYPTO-LOGICA SOLUTIONS
• Crypto-Logica Team developed its own key
exchange, symmetric key encryption and hash
authentication
7. CRYPTO-LOGICA METHODS
ENCRYPTION METHOD
KEY LENGTH [bits]
TYPE
BLOCK
[bits]
SHORT
LONG
MIN
MAX
Stream
CLIS
Ideal Stream (4)
256
4096
∞
Stream
CLOS
Occult Stream
256
128
Stream
CLAS
Advanced Stream
512
Stream
CLUS
Ultimate Stream
384
Stream
CLES
Extreme Stream
768
Block
CLOB
Occult Block
256
Block
CLAB
Advanced Block
512
Block
CLUB
Ultimate Block
384
Block
CLEB
Extreme Block
768
∞
∞
∞
∞
∞
∞
∞
∞
256
256
256
128
256
256
256
8. SPEED @ SINGLE THREAD i7 2.2GHz
T
Y
P
E
B
S
S
S
S
S
B
B
B
B
NATIVE CL
KEY
BLOCK ENC/DEC CL SPEED
ALGORITHM LENGTH SIZE
SPEED AES SPEED
VS AES CTR
[bits]
[bits]
[Gbit/s]
OPTIMIZED
AES CTR
256
128
1,401
1
CLIS
4096
∞
6,752
4,819
CLOS
4096
128
5,308
3,789
CLAS
4096
256
6,663
4,756
CLUS
4096
256
6,834
4,878
CLES
4096
256
4,544
3,243
CLOB
4096
128
5,263
3,757
CLAB
4096
256
6,799
4,853
CLUB
4096
256
6,594
4,707
CLEB
4096
256
4,640
3,312
9. USER ADJUSTABLE PARAMETERS
Crypto-Logica solutions
Hybrid stream ciphers
Hybrid block ciphers
4 simple stream methods
4 hybrid stream methods
4 hybrid block methods
8 hybrid hash methods
Zero encryption overhead
Identical ciphertext and
plaintext bitrate
Identical ciphertext and
plaintext file size
Encryption speed almost
independent on key length
Hash speed almost
independent on signature
User parameters
Size [bits]
Key length
256..4,294,967,296
Hash signature
256..4,294,967,296
Hash length
256..65,536
Stream offset
8, 16, 32 or 64
Stream sum
8, 16, 32 or 64
Stream counter
8, 16, 32 or 64
Stream increment
8, 16, 32 or 64
Block offset
8, 16, 32 or 64
Block rounds
8, 16, 32 or 64
Block counter
8, 16, 32 or 64
Block Increment
8, 16, 32 or 64
10. NIST STS 2.1 RANDOMNESS TESTS
• CRYPTO-LOGICA methods passed all NIST STS 2.1 tests,
determining whether or not the sequence can be considered
random, while being many times faster than AES. For example:
Linear Complexity
1.00
Speed Non-Optimized CL and Optimized AES CTR [Gbit/s]
7
6
0.99
5
0.98
4
3
0.97
2
0.96
1
0
0.95
AES
CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB
AES
CLIS CLOS CLAS CLUS CLES CLOB CLAB CLUB CLEB
• CRYPTO-LOGICA methods solved all security, method, technical
and practical problems in key exchange, symmetric key
encryption and hash authentication, both now and in the future!