SlideShare a Scribd company logo
Abstracts of Clape Technologies
www.clape.io
Asansol Astha IT Projects (P) Ltd. is an well-
established, result-oriented IT Solutions Company.
We are highly client-oriented and quality-conscious
and our portfolio basket includes a wide range of
services and solutions in the area of Data Security &
Business Applications.
Clape Technologies Ltd (A sister organization of
Asansol Astha IT Projects (P) Ltd.) is working upon
the patent pending symmetric key encryption
standard and the Abstract of the patent application is
detailed below.
Asansol Astha IT Projects (P) Ltd.
Abstract of the Patent Application for Symmetric Key
Encryption Standard
The present invention relates to a system and a method for
secured transmission of data. The method comprises the
steps of providing the data, generating a password or a key
by a user, encrypting the data by the password or the key for
plural number of times resulting plurality of cipher texts,
sending plurality of the cipher texts and the password or key,
and decrypting the cipher text by the password or the key.
The system comprises input device means for providing the
data, input device means for generating a password by a
user, processor means encrypting the data by the password
or key for plural number of times resulting plurality of cipher
texts, means for sending the plurality of cipher texts and the
password and means for decrypting the cipher text by the
password or key.
What the Company does:-
•Our Company has conceived a Symmetric Key Encryption Standard
and has filed for patenting in Indian Patent Office vide application
no.0992/KOL/2011 dated. 26.07.2011 in Kolkata Patent Office Entitled as
“A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY
CRYPTOGRAPHIC COMMUNICATIONS.” And was published in the
Indian Patent Office Journal on 2nd December 2011. Moreover we have
applied for patenting in USPTO vide application no 13/557112 date
24.07.2012 and was published in USPTO Journal on 31.12.2012
•The Company has also applied for a Asymmetric Key cryptographic
Standard and has filed for patenting in Indian Patent Office (I.P.O
Kolkata ) vide application no.446/KOL/2012 dated. 19/04/2012 in
Kolkata Patent Office Entitled as “METHOD FOR ESTABLISHING
SECURE COMMUNICATION IN A NETWORK AND SYSTEM
THEREOF” And was published in the Indian Patent Office(IPO) Journal
on 24/08/2012
Technology
Every block cipher involves a transformation of a block of
plain text into block of cipher text, where the transformation
depends on the cipher key. The mechanism of our encryption
procedure seeks to make the statistical relationship between
the plain text and the cipher text as complex as possible to
prevent attempts to derive the cipher key.
The technology a basic building block, which encrypts /
decrypts a fixed size block of data, however to use these in
practice, we usually need to handle arbitrary amount of data
, which may be available in advance, (in which case a block
mode is appropriate).
Technology
•Block size: with a view to improve security the block size
has been increased but without any compromise to the
speed of the procedure.
•Key Size: increasing size improves security, makes
exhaustive key searching harder but without any
compromise with the speed of encryption / decryption
function.
•Number of rounds: increasing number of rounds in our
technology shall improve security but without slowing the
Cipher Generation Procedure.
CLAPE CIPHER DESIGN PRINCIPLES :
It encrypts 1024 bit blocks of plain text with the Cipher Key having same size
of bits, using appropriate iterations of an elaborate combination of table look
up and bits rearrange.
Through this procedure the password key is being made into a 1024 bit block
size and correspondingly a chunk of plain text of same bit size are being put
into our own encryption algorithm to generate a chunk of cipher text.
It is commonly believed that the strength of the Password much depends on
the method how the encryption algorithm is deployed.
In practicality, it has been observed that the user doesn't always want to use
password as long as needed for effective key generation.
As such responsibility of securing the password of the user rests on the
Encryption Technology.
There is no need for using salts/pass phrases in this technology for
strengthening the password what any common user tends to apply to achieve
utmost security.
The Cryptographic community needs to provide the world with a new
encryption standard.
The few workhorse algorithms for the last few decades are nearing the end
of their useful life cycle.
Moreover the recent attacks as evident in the following links provided
herein:-
www.forbes.com/sites/andygreenberg/
2013/03/13/cryptographers_show_mathematically_crackable_flaw
s_in_common_web_encryption/
www.arstechnica.com/security/2013/02/lucky_thirteen_attacks_sn
arfs_cookies_protected_by_SSL_encryption/
www.theregister.co.uk/2011/09/19/beast_exploits_paypal_SSL/
www.isg.rhul.ac.uk/tls/TLS timing.pdf on Padding Oracle attack
Recent attacks on existing workhorse algorithms
In this context if the world is to have a secure
reliable and easily available encryption
algorithm by the turn of the decade the world
needs several candidate symmetric Key
encryption algorithms now. These algorithms
have to be subjected to years of public scrutiny
and cryptanalysis. We are confident that our
encryption standard will survive this process
and shall eventually become a new standard.
Mission:-
Performance Comparison Study:
This comparison has been conducted to measure
encryption / decryption speed of Clape with
other encryption algorithms like Blow fish, AES,
DES, 3DES etc. at different settings for each
algorithm such as; different sizes of data blocks,
different key sizes, encryption / decryption speed
/ power Consumption etc.
THIS STUDY EVALUATES SEVEN DIFFERENT
ENCRYPTION ALGORITHMS NAMELY; AES,
DES, 3DES, RC6, BLOWFISH, RC2 & CLAPE. THE
PERFORMANCE MEASURE OF ENCRYPTION
SCHEMES HAS BEEN CONDUCTED IN TERMS
OF CHANGING FILE SIZE FOR THE SELECTED
CRYPTOGRAPHIC ALGORITHMS.
 Hardware used: i3 processor 2.10 GHz, 3GB
RAM and i3 processor, 2.20 GHz, 2GB RAM
 Energy consumption : It is observed that 600
times of encryption of a 5 MB file utilizes
only 20% (approx) of the available Battery
power of the laptop.
 All the tests have been performed on
commonly known file formats.
Specifications:
Time Comparison of encryption algorithms
Results are based on base 64 encoding
Decryption Time (in milliseconds)
Results are based on base 64 encoding
Encryption Time (in milliseconds) for Medium Size of file
Results are based on base 64 encoding
Decryption Time (in milliseconds) for Medium Size of file
Results are based on base 64 encoding
Encryption Time (in milliseconds)
Results are based on base 64 encoding
Decryption Time (in milliseconds)
Results are based on base 64 encoding
Graph showing time consumption for encryption with different
key sizes for a specific size of File (7.14MB).
Results are based on
base 64 encoding
Graph showing time consumption for decryption with different
key sizes for a specific size of File (7.14MB).
Results are based on
base 64 encoding
Graph showing time consumption for encryption with different
key sizes for a specific size of File (694 Kb)
Results are based on
base 64 encoding
Graph showing time consumption for decryption with different key
sizes for a specific size of File (694 Kb)
Results are based on
base 64 encoding
Acknowledgement:-
International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010}
International Business Information Management Association (IBIMA).
Looking forward to arranging a presentation to demonstrate the authenticity of our claims
through Remote Screen Sharing / visit to our lab /any other conceivable mode of testing.
Websites:
www.clape.io
www.asthaitsolutions.com
Contacts:
+1 202 642 3323 (USA)
+91 341 225 0077 (India)
E-mail:
info@asthaitsolutions.com
info@clape.io

More Related Content

What's hot (20)

PPT
Symmetric & Asymmetric Cryptography
chauhankapil
 
PPTX
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
 
PPTX
Cryptography - Simplified - Asymmetric Encryption
Abdul Manaf Vellakodath
 
PPTX
Basic Cryptography unit 4 CSS
Dr. SURBHI SAROHA
 
DOCX
Data encryption standard
Prasad Prabhu
 
PPTX
Cryptography
Shivanand Arur
 
PPTX
Cryptography
AnandKaGe
 
PPTX
Encryption
keith dias
 
ODP
Encryption Techniques
Del Elson
 
PPTX
Different types of Symmetric key Cryptography
subhradeep mitra
 
PPTX
Cryptography and Network Security
Pa Van Tanku
 
PPTX
Cryptography
Rutuja Solkar
 
PPT
Cryptography
PPT4U
 
PPT
Cryptography Intro
Christopher Martin
 
PPTX
Cryptography
jayashri kolekar
 
PPT
6. cryptography
7wounders
 
PPTX
Cryptography and network security
Nagendra Um
 
PPTX
Encryption
Jasleen Khalsa
 
PPTX
Network security and cryptography
RajKumar Rampelli
 
PPT
key distribution in network security
babak danyal
 
Symmetric & Asymmetric Cryptography
chauhankapil
 
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
 
Cryptography - Simplified - Asymmetric Encryption
Abdul Manaf Vellakodath
 
Basic Cryptography unit 4 CSS
Dr. SURBHI SAROHA
 
Data encryption standard
Prasad Prabhu
 
Cryptography
Shivanand Arur
 
Cryptography
AnandKaGe
 
Encryption
keith dias
 
Encryption Techniques
Del Elson
 
Different types of Symmetric key Cryptography
subhradeep mitra
 
Cryptography and Network Security
Pa Van Tanku
 
Cryptography
Rutuja Solkar
 
Cryptography
PPT4U
 
Cryptography Intro
Christopher Martin
 
Cryptography
jayashri kolekar
 
6. cryptography
7wounders
 
Cryptography and network security
Nagendra Um
 
Encryption
Jasleen Khalsa
 
Network security and cryptography
RajKumar Rampelli
 
key distribution in network security
babak danyal
 

Viewers also liked (20)

PDF
symmetric key encryption algorithms
Rashmi Burugupalli
 
PPT
12 symmetric key cryptography
drewz lin
 
PPTX
Encryption
Nitin Parbhakar
 
PDF
What to do when pseudo- is not good enough
Angel Marchev
 
ODP
Random
ivoelenchev
 
PPTX
Management System Key Elements
Phil Byrne
 
PPTX
Random Numbers Certified By Bells Theorem
David Kemp
 
DOC
A securing symmetric key distribution
vinothp2k
 
ODP
Numerals
Inka Vilén
 
PPTX
Random numbers
Ernesto Zoffmann Rodríguez
 
PPT
Quan nguyen symmetric versus asymmetric cryptography
Information Security Awareness Group
 
PPTX
Key Management System Presentation: Jaguar
m_phull
 
PPTX
IBM System Storage Data Encryption
Behroz Zarrinfar
 
PDF
Google drive on linux
維泰 蔡
 
PDF
Algorithms for Computer Games - lecture slides 2009
Jouni Smed
 
PDF
Random Number Generators
Andrew Collier
 
PDF
Random number generation (in C++) – past, present and potential future
Pattabi Raman
 
PDF
Pseudo Random Number Generators
Darshini Parikh
 
PDF
What is pseudo random number
Akshay Tikekar
 
PPTX
Data Encryption Standard (DES)
Haris Ahmed
 
symmetric key encryption algorithms
Rashmi Burugupalli
 
12 symmetric key cryptography
drewz lin
 
Encryption
Nitin Parbhakar
 
What to do when pseudo- is not good enough
Angel Marchev
 
Random
ivoelenchev
 
Management System Key Elements
Phil Byrne
 
Random Numbers Certified By Bells Theorem
David Kemp
 
A securing symmetric key distribution
vinothp2k
 
Numerals
Inka Vilén
 
Quan nguyen symmetric versus asymmetric cryptography
Information Security Awareness Group
 
Key Management System Presentation: Jaguar
m_phull
 
IBM System Storage Data Encryption
Behroz Zarrinfar
 
Google drive on linux
維泰 蔡
 
Algorithms for Computer Games - lecture slides 2009
Jouni Smed
 
Random Number Generators
Andrew Collier
 
Random number generation (in C++) – past, present and potential future
Pattabi Raman
 
Pseudo Random Number Generators
Darshini Parikh
 
What is pseudo random number
Akshay Tikekar
 
Data Encryption Standard (DES)
Haris Ahmed
 
Ad

Similar to Symmetric key encryption (20)

PPTX
Encryption symmetric key
mdhar123
 
PPTX
Secure Channels Presentation
Richard Blech
 
PPTX
Symmetric key encryption new approach
mdhar123
 
PDF
L017136269
IOSR Journals
 
PDF
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
DOC
Internet security evaluation system documentation nikitha
Susmitha Reddy
 
PDF
Cisco cybersecurity essentials chapter 4
Mukesh Chinta
 
PDF
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
PDF
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
PDF
Implement a novel symmetric block
ijcisjournal
 
PDF
Enhancing the Techniques to Secure Grid Computing
ijtsrd
 
PDF
Iaetsd enhanced cryptography algorithm for providing
Iaetsd Iaetsd
 
PDF
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
 
PDF
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
PDF
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal
 
PPTX
Comparative analysis of algorithms
Yisal Khan
 
PDF
N45028390
IJERA Editor
 
PDF
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 
PDF
Solve Big Data Security Issues
Editor IJCATR
 
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
Encryption symmetric key
mdhar123
 
Secure Channels Presentation
Richard Blech
 
Symmetric key encryption new approach
mdhar123
 
L017136269
IOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
Internet security evaluation system documentation nikitha
Susmitha Reddy
 
Cisco cybersecurity essentials chapter 4
Mukesh Chinta
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
Implement a novel symmetric block
ijcisjournal
 
Enhancing the Techniques to Secure Grid Computing
ijtsrd
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd Iaetsd
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
 
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal
 
Comparative analysis of algorithms
Yisal Khan
 
N45028390
IJERA Editor
 
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 
Solve Big Data Security Issues
Editor IJCATR
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
Ad

Symmetric key encryption

  • 1. Abstracts of Clape Technologies www.clape.io
  • 2. Asansol Astha IT Projects (P) Ltd. is an well- established, result-oriented IT Solutions Company. We are highly client-oriented and quality-conscious and our portfolio basket includes a wide range of services and solutions in the area of Data Security & Business Applications. Clape Technologies Ltd (A sister organization of Asansol Astha IT Projects (P) Ltd.) is working upon the patent pending symmetric key encryption standard and the Abstract of the patent application is detailed below. Asansol Astha IT Projects (P) Ltd.
  • 3. Abstract of the Patent Application for Symmetric Key Encryption Standard The present invention relates to a system and a method for secured transmission of data. The method comprises the steps of providing the data, generating a password or a key by a user, encrypting the data by the password or the key for plural number of times resulting plurality of cipher texts, sending plurality of the cipher texts and the password or key, and decrypting the cipher text by the password or the key. The system comprises input device means for providing the data, input device means for generating a password by a user, processor means encrypting the data by the password or key for plural number of times resulting plurality of cipher texts, means for sending the plurality of cipher texts and the password and means for decrypting the cipher text by the password or key.
  • 4. What the Company does:- •Our Company has conceived a Symmetric Key Encryption Standard and has filed for patenting in Indian Patent Office vide application no.0992/KOL/2011 dated. 26.07.2011 in Kolkata Patent Office Entitled as “A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC COMMUNICATIONS.” And was published in the Indian Patent Office Journal on 2nd December 2011. Moreover we have applied for patenting in USPTO vide application no 13/557112 date 24.07.2012 and was published in USPTO Journal on 31.12.2012 •The Company has also applied for a Asymmetric Key cryptographic Standard and has filed for patenting in Indian Patent Office (I.P.O Kolkata ) vide application no.446/KOL/2012 dated. 19/04/2012 in Kolkata Patent Office Entitled as “METHOD FOR ESTABLISHING SECURE COMMUNICATION IN A NETWORK AND SYSTEM THEREOF” And was published in the Indian Patent Office(IPO) Journal on 24/08/2012
  • 5. Technology Every block cipher involves a transformation of a block of plain text into block of cipher text, where the transformation depends on the cipher key. The mechanism of our encryption procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key. The technology a basic building block, which encrypts / decrypts a fixed size block of data, however to use these in practice, we usually need to handle arbitrary amount of data , which may be available in advance, (in which case a block mode is appropriate).
  • 6. Technology •Block size: with a view to improve security the block size has been increased but without any compromise to the speed of the procedure. •Key Size: increasing size improves security, makes exhaustive key searching harder but without any compromise with the speed of encryption / decryption function. •Number of rounds: increasing number of rounds in our technology shall improve security but without slowing the Cipher Generation Procedure.
  • 7. CLAPE CIPHER DESIGN PRINCIPLES : It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations of an elaborate combination of table look up and bits rearrange. Through this procedure the password key is being made into a 1024 bit block size and correspondingly a chunk of plain text of same bit size are being put into our own encryption algorithm to generate a chunk of cipher text. It is commonly believed that the strength of the Password much depends on the method how the encryption algorithm is deployed. In practicality, it has been observed that the user doesn't always want to use password as long as needed for effective key generation. As such responsibility of securing the password of the user rests on the Encryption Technology. There is no need for using salts/pass phrases in this technology for strengthening the password what any common user tends to apply to achieve utmost security.
  • 8. The Cryptographic community needs to provide the world with a new encryption standard. The few workhorse algorithms for the last few decades are nearing the end of their useful life cycle. Moreover the recent attacks as evident in the following links provided herein:- www.forbes.com/sites/andygreenberg/ 2013/03/13/cryptographers_show_mathematically_crackable_flaw s_in_common_web_encryption/ www.arstechnica.com/security/2013/02/lucky_thirteen_attacks_sn arfs_cookies_protected_by_SSL_encryption/ www.theregister.co.uk/2011/09/19/beast_exploits_paypal_SSL/ www.isg.rhul.ac.uk/tls/TLS timing.pdf on Padding Oracle attack Recent attacks on existing workhorse algorithms
  • 9. In this context if the world is to have a secure reliable and easily available encryption algorithm by the turn of the decade the world needs several candidate symmetric Key encryption algorithms now. These algorithms have to be subjected to years of public scrutiny and cryptanalysis. We are confident that our encryption standard will survive this process and shall eventually become a new standard. Mission:-
  • 10. Performance Comparison Study: This comparison has been conducted to measure encryption / decryption speed of Clape with other encryption algorithms like Blow fish, AES, DES, 3DES etc. at different settings for each algorithm such as; different sizes of data blocks, different key sizes, encryption / decryption speed / power Consumption etc.
  • 11. THIS STUDY EVALUATES SEVEN DIFFERENT ENCRYPTION ALGORITHMS NAMELY; AES, DES, 3DES, RC6, BLOWFISH, RC2 & CLAPE. THE PERFORMANCE MEASURE OF ENCRYPTION SCHEMES HAS BEEN CONDUCTED IN TERMS OF CHANGING FILE SIZE FOR THE SELECTED CRYPTOGRAPHIC ALGORITHMS.
  • 12.  Hardware used: i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM  Energy consumption : It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.  All the tests have been performed on commonly known file formats. Specifications:
  • 13. Time Comparison of encryption algorithms Results are based on base 64 encoding
  • 14. Decryption Time (in milliseconds) Results are based on base 64 encoding
  • 15. Encryption Time (in milliseconds) for Medium Size of file Results are based on base 64 encoding
  • 16. Decryption Time (in milliseconds) for Medium Size of file Results are based on base 64 encoding
  • 17. Encryption Time (in milliseconds) Results are based on base 64 encoding
  • 18. Decryption Time (in milliseconds) Results are based on base 64 encoding
  • 19. Graph showing time consumption for encryption with different key sizes for a specific size of File (7.14MB). Results are based on base 64 encoding
  • 20. Graph showing time consumption for decryption with different key sizes for a specific size of File (7.14MB). Results are based on base 64 encoding
  • 21. Graph showing time consumption for encryption with different key sizes for a specific size of File (694 Kb) Results are based on base 64 encoding
  • 22. Graph showing time consumption for decryption with different key sizes for a specific size of File (694 Kb) Results are based on base 64 encoding
  • 23. Acknowledgement:- International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010} International Business Information Management Association (IBIMA). Looking forward to arranging a presentation to demonstrate the authenticity of our claims through Remote Screen Sharing / visit to our lab /any other conceivable mode of testing. Websites: www.clape.io www.asthaitsolutions.com Contacts: +1 202 642 3323 (USA) +91 341 225 0077 (India) E-mail: [email protected] [email protected]