SlideShare une entreprise Scribd logo
1  sur  23
Abstracts of Clape Technologies
www.clape.io
Asansol Astha IT Projects (P) Ltd. is an well-
established, result-oriented IT Solutions Company.
We are highly client-oriented and quality-conscious
and our portfolio basket includes a wide range of
services and solutions in the area of Data Security &
Business Applications.
Clape Technologies Ltd (A sister organization of
Asansol Astha IT Projects (P) Ltd.) is working upon
the patent pending symmetric key encryption
standard and the Abstract of the patent application is
detailed below.
Asansol Astha IT Projects (P) Ltd.
Abstract of the Patent Application for Symmetric Key
Encryption Standard
The present invention relates to a system and a method for
secured transmission of data. The method comprises the
steps of providing the data, generating a password or a key
by a user, encrypting the data by the password or the key for
plural number of times resulting plurality of cipher
texts, sending plurality of the cipher texts and the password
or key, and decrypting the cipher text by the password or the
key. The system comprises input device means for providing
the data, input device means for generating a password by a
user, processor means encrypting the data by the password
or key for plural number of times resulting plurality of cipher
texts, means for sending the plurality of cipher texts and the
password and means for decrypting the cipher text by the
password or key.
What the Company does:-
•Our Company has conceived a Symmetric Key Encryption Standard
and has filed for patenting in Indian Patent Office vide application
no.0992/KOL/2011 dated. 26.07.2011 in Kolkata Patent Office Entitled as
“A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY
CRYPTOGRAPHIC COMMUNICATIONS.” And was published in the
Indian Patent Office Journal on 2nd December 2011. Moreover we have
applied for patenting in USPTO vide application no 13/557112 date
24.07.2012 and was published in USPTO Journal on 31.12.2012
•The Company has also applied for a Asymmetric Key cryptographic
Standard and has filed for patenting in Indian Patent Office (I.P.O
Kolkata ) vide application no.446/KOL/2012 dated. 19/04/2012 in
Kolkata Patent Office Entitled as “METHOD FOR ESTABLISHING
SECURE COMMUNICATION IN A NETWORK AND SYSTEM
THEREOF” And was published in the Indian Patent Office(IPO) Journal
on 24/08/2012
Technology
Every block cipher involves a transformation of a block of
plain text into block of cipher text, where the transformation
depends on the cipher key. The mechanism of our encryption
procedure seeks to make the statistical relationship between
the plain text and the cipher text as complex as possible to
prevent attempts to derive the cipher key.
The technology a basic building block, which encrypts /
decrypts a fixed size block of data, however to use these in
practice, we usually need to handle arbitrary amount of data
, which may be available in advance, (in which case a block
mode is appropriate).
Technology
•Block size: with a view to improve security the block size
has been increased but without any compromise to the
speed of the procedure.
•Key Size: increasing size improves security, makes
exhaustive key searching harder but without any
compromise with the speed of encryption / decryption
function.
•Number of rounds: increasing number of rounds in our
technology shall improve security but without slowing the
Cipher Generation Procedure.
CLAPE CIPHER DESIGN PRINCIPLES :
It encrypts 1024 bit blocks of plain text with the Cipher Key having same size
of bits, using appropriate iterations of an elaborate combination of table look
up and bits rearrange.
Through this procedure the password key is being made into a 1024 bit block
size and correspondingly a chunk of plain text of same bit size are being put
into our own encryption algorithm to generate a chunk of cipher text.
It is commonly believed that the strength of the Password much depends on
the method how the encryption algorithm is deployed.
In practicality, it has been observed that the user doesn't always want to use
password as long as needed for effective key generation.
As such responsibility of securing the password of the user rests on the
Encryption Technology.
There is no need for using salts/pass phrases in this technology for
strengthening the password what any common user tends to apply to achieve
utmost security.
Recent attacks on existing workhorse algorithms
http://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show-
mathematically-crackable-flaws-in-common-web-encryption/
http://arstechnica.com/security/2013/02/lucky-thirteen-attack-snarfs-cookies-protected-
by-ssl-encryption/
http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
http://www.isg.rhul.ac.uk/~kp/padding.pdf
The Cryptographic community needs to provide the world with a new
encryption standard.
The few workhorse algorithms for the last few decades are nearing the end
of their useful life cycle.
Moreover the recent attacks as evident in the following links provided
herein:-
In this context if the world is to have a secure
reliable and easily available encryption
algorithm by the turn of the decade the world
needs several candidate symmetric Key
encryption algorithms now. These algorithms
have to be subjected to years of public scrutiny
and cryptanalysis. We are confident that our
encryption standard will survive this process
and shall eventually become a new standard.
Mission:-
Performance Comparison Study:
This comparison has been conducted to measure
encryption / decryption speed of Clape with
other encryption algorithms like Blow
fish, AES, DES, 3DES etc. at different settings for
each algorithm such as; different sizes of data
blocks, different key sizes, encryption /
decryption speed / power Consumption etc.
THIS STUDY EVALUATES SEVEN DIFFERENT
ENCRYPTION ALGORITHMS NAMELY;
AES, DES, 3DES, RC6, BLOWFISH, RC2 & CLAPE.
THE PERFORMANCE MEASURE OF
ENCRYPTION SCHEMES HAS BEEN
CONDUCTED IN TERMS OF CHANGING FILE
SIZE FOR THE SELECTED CRYPTOGRAPHIC
ALGORITHMS.
 Hardware used: i3 processor 2.10 GHz, 3GB
RAM and i3 processor, 2.20 GHz, 2GB RAM
 Energy consumption : It is observed that 600
times of encryption of a 5 MB file utilizes
only 20% (approx) of the available Battery
power of the laptop.
 All the tests have been performed on
commonly known file formats.
Specifications:
Time Comparison of encryption algorithms
Results are based on base 64 encoding
Decryption Time (in milliseconds)
Results are based on base 64 encoding
Encryption Time (in milliseconds) for Medium Size of file
Results are based on base 64 encoding
Decryption Time (in milliseconds) for Medium Size of file
Results are based on base 64 encoding
Encryption Time (in milliseconds)
Results are based on base 64 encoding
Decryption Time (in milliseconds)
Results are based on base 64 encoding
Graph showing time consumption for encryption with different
key sizes for a specific size of File (7.14MB).
Results are based on
base 64 encoding
Graph showing time consumption for decryption with different
key sizes for a specific size of File (7.14MB).
Results are based on
base 64 encoding
Graph showing time consumption for encryption with different
key sizes for a specific size of File (694 Kb)
Results are based on
base 64 encoding
Graph showing time consumption for decryption with different key
sizes for a specific size of File (694 Kb)
Results are based on
base 64 encoding
Acknowledgement:-
International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010}
International Business Information Management Association (IBIMA).
Looking forward to arranging a presentation to demonstrate the authenticity of our claims
through Remote Screen Sharing / visit to our lab /any other conceivable mode of testing.
Websites:
www.clape.io
www.asthaitsolutions.com
Contacts:
+1 202 642 3323 (USA)
+91 341 225 0077 (India)
E-mail:
info@asthaitsolutions.com
info@clape.io

Contenu connexe

Tendances

Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164
Thivya Devaraj
 

Tendances (20)

Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Pgp
PgpPgp
Pgp
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164
 
Ssl for e commerce
Ssl for  e commerceSsl for  e commerce
Ssl for e commerce
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
Ipsec
IpsecIpsec
Ipsec
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
Network security cs8
Network security  cs8Network security  cs8
Network security cs8
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Pgp1
Pgp1Pgp1
Pgp1
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption Techniques
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 

Similaire à Encryption symmetric key

Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
mdhar123
 
Symmetric key encryption new approach
Symmetric key encryption new approachSymmetric key encryption new approach
Symmetric key encryption new approach
mdhar123
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
Susmitha Reddy
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
Iaetsd Iaetsd
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 

Similaire à Encryption symmetric key (20)

Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
Symmetric key encryption new approach
Symmetric key encryption new approachSymmetric key encryption new approach
Symmetric key encryption new approach
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels Presentation
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
Comparative analysis of algorithms
Comparative analysis of algorithmsComparative analysis of algorithms
Comparative analysis of algorithms
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Encryption symmetric key

  • 1. Abstracts of Clape Technologies www.clape.io
  • 2. Asansol Astha IT Projects (P) Ltd. is an well- established, result-oriented IT Solutions Company. We are highly client-oriented and quality-conscious and our portfolio basket includes a wide range of services and solutions in the area of Data Security & Business Applications. Clape Technologies Ltd (A sister organization of Asansol Astha IT Projects (P) Ltd.) is working upon the patent pending symmetric key encryption standard and the Abstract of the patent application is detailed below. Asansol Astha IT Projects (P) Ltd.
  • 3. Abstract of the Patent Application for Symmetric Key Encryption Standard The present invention relates to a system and a method for secured transmission of data. The method comprises the steps of providing the data, generating a password or a key by a user, encrypting the data by the password or the key for plural number of times resulting plurality of cipher texts, sending plurality of the cipher texts and the password or key, and decrypting the cipher text by the password or the key. The system comprises input device means for providing the data, input device means for generating a password by a user, processor means encrypting the data by the password or key for plural number of times resulting plurality of cipher texts, means for sending the plurality of cipher texts and the password and means for decrypting the cipher text by the password or key.
  • 4. What the Company does:- •Our Company has conceived a Symmetric Key Encryption Standard and has filed for patenting in Indian Patent Office vide application no.0992/KOL/2011 dated. 26.07.2011 in Kolkata Patent Office Entitled as “A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC COMMUNICATIONS.” And was published in the Indian Patent Office Journal on 2nd December 2011. Moreover we have applied for patenting in USPTO vide application no 13/557112 date 24.07.2012 and was published in USPTO Journal on 31.12.2012 •The Company has also applied for a Asymmetric Key cryptographic Standard and has filed for patenting in Indian Patent Office (I.P.O Kolkata ) vide application no.446/KOL/2012 dated. 19/04/2012 in Kolkata Patent Office Entitled as “METHOD FOR ESTABLISHING SECURE COMMUNICATION IN A NETWORK AND SYSTEM THEREOF” And was published in the Indian Patent Office(IPO) Journal on 24/08/2012
  • 5. Technology Every block cipher involves a transformation of a block of plain text into block of cipher text, where the transformation depends on the cipher key. The mechanism of our encryption procedure seeks to make the statistical relationship between the plain text and the cipher text as complex as possible to prevent attempts to derive the cipher key. The technology a basic building block, which encrypts / decrypts a fixed size block of data, however to use these in practice, we usually need to handle arbitrary amount of data , which may be available in advance, (in which case a block mode is appropriate).
  • 6. Technology •Block size: with a view to improve security the block size has been increased but without any compromise to the speed of the procedure. •Key Size: increasing size improves security, makes exhaustive key searching harder but without any compromise with the speed of encryption / decryption function. •Number of rounds: increasing number of rounds in our technology shall improve security but without slowing the Cipher Generation Procedure.
  • 7. CLAPE CIPHER DESIGN PRINCIPLES : It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations of an elaborate combination of table look up and bits rearrange. Through this procedure the password key is being made into a 1024 bit block size and correspondingly a chunk of plain text of same bit size are being put into our own encryption algorithm to generate a chunk of cipher text. It is commonly believed that the strength of the Password much depends on the method how the encryption algorithm is deployed. In practicality, it has been observed that the user doesn't always want to use password as long as needed for effective key generation. As such responsibility of securing the password of the user rests on the Encryption Technology. There is no need for using salts/pass phrases in this technology for strengthening the password what any common user tends to apply to achieve utmost security.
  • 8. Recent attacks on existing workhorse algorithms http://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show- mathematically-crackable-flaws-in-common-web-encryption/ http://arstechnica.com/security/2013/02/lucky-thirteen-attack-snarfs-cookies-protected- by-ssl-encryption/ http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/ http://www.isg.rhul.ac.uk/~kp/padding.pdf The Cryptographic community needs to provide the world with a new encryption standard. The few workhorse algorithms for the last few decades are nearing the end of their useful life cycle. Moreover the recent attacks as evident in the following links provided herein:-
  • 9. In this context if the world is to have a secure reliable and easily available encryption algorithm by the turn of the decade the world needs several candidate symmetric Key encryption algorithms now. These algorithms have to be subjected to years of public scrutiny and cryptanalysis. We are confident that our encryption standard will survive this process and shall eventually become a new standard. Mission:-
  • 10. Performance Comparison Study: This comparison has been conducted to measure encryption / decryption speed of Clape with other encryption algorithms like Blow fish, AES, DES, 3DES etc. at different settings for each algorithm such as; different sizes of data blocks, different key sizes, encryption / decryption speed / power Consumption etc.
  • 11. THIS STUDY EVALUATES SEVEN DIFFERENT ENCRYPTION ALGORITHMS NAMELY; AES, DES, 3DES, RC6, BLOWFISH, RC2 & CLAPE. THE PERFORMANCE MEASURE OF ENCRYPTION SCHEMES HAS BEEN CONDUCTED IN TERMS OF CHANGING FILE SIZE FOR THE SELECTED CRYPTOGRAPHIC ALGORITHMS.
  • 12.  Hardware used: i3 processor 2.10 GHz, 3GB RAM and i3 processor, 2.20 GHz, 2GB RAM  Energy consumption : It is observed that 600 times of encryption of a 5 MB file utilizes only 20% (approx) of the available Battery power of the laptop.  All the tests have been performed on commonly known file formats. Specifications:
  • 13. Time Comparison of encryption algorithms Results are based on base 64 encoding
  • 14. Decryption Time (in milliseconds) Results are based on base 64 encoding
  • 15. Encryption Time (in milliseconds) for Medium Size of file Results are based on base 64 encoding
  • 16. Decryption Time (in milliseconds) for Medium Size of file Results are based on base 64 encoding
  • 17. Encryption Time (in milliseconds) Results are based on base 64 encoding
  • 18. Decryption Time (in milliseconds) Results are based on base 64 encoding
  • 19. Graph showing time consumption for encryption with different key sizes for a specific size of File (7.14MB). Results are based on base 64 encoding
  • 20. Graph showing time consumption for decryption with different key sizes for a specific size of File (7.14MB). Results are based on base 64 encoding
  • 21. Graph showing time consumption for encryption with different key sizes for a specific size of File (694 Kb) Results are based on base 64 encoding
  • 22. Graph showing time consumption for decryption with different key sizes for a specific size of File (694 Kb) Results are based on base 64 encoding
  • 23. Acknowledgement:- International Journal of Network Security, Vol.10, No.3, PP.213 {219, May 2010} International Business Information Management Association (IBIMA). Looking forward to arranging a presentation to demonstrate the authenticity of our claims through Remote Screen Sharing / visit to our lab /any other conceivable mode of testing. Websites: www.clape.io www.asthaitsolutions.com Contacts: +1 202 642 3323 (USA) +91 341 225 0077 (India) E-mail: info@asthaitsolutions.com info@clape.io