New Encryption Algorithm with Anti-Statistical and Differential Cryptanalysis-Defeating Properties Announced by MerlinCryption CTO

Jun 23, 2012 by

Austin, TX (PRWEB) April 26, 2012

The development of the Anti-Statistical Block Encryption (ASBE) algorithm, which employs variable key length and requires no key transfer, overcomes two major vulnerabilities for the cryptographic design community.

The encryption key is the point of vulnerability, making it the target of choice for criminals, explains Paul Prem Sobel, CTO MerlinCryption LLC and ASBE developer, Successful attacks more often break the key or capture it through its method of communication.

The ASBE algorithm defeats differential cryptanalysis with a variable key that scales from 251 bytes to 2 gigabytes in length. While its larger and changing key length leverages the difficulty of prediction, its use is not cyclic. Standard differential analysis and any attempt at byte frequency cannot crack it.

ASBE key generation, communication, and storage cannot be detected, as keys are generated-destroyed-recreated, on demand. This eliminates a need to communicate the key, circumventing criminal interception.

The algorithms anti-statistical + key dependent block encryption attributes, stem from my research in the foundations of mathematics and from creating encryption algorithms in early career tenures, says Sobel, I realized how to modify an algorithm to exponentially strengthen the program against brute force attack.

The extensions were also designed to defeat Differential Cryptanalysis. One of the effects of these extensions is that given identical input (plaintext to encrypt, key, and password) the resulting cyphertext is different every time, even in length.

The mathematical approach of factoring, ECDLP, or similar analysis cannot be used against the algorithm, as it uses a sequence of non-linear steps, which exhibit no periodic repetition.

In an interview with The M2M Daily News, earlier this week, Sobel discusses the algorithms red herrings and noise injection in securing device and machine-to-machine connectivity.

The encryption incorporates a scalable password to 64K bytes and is efficient, fast, and agile. It is BIS/NSA approved for export, and OFAC compliant.

About MerlinCryption LLC

The Smart-Worlds Smart-Encryption software company in Austin TX, MerlinCryption LLC develops encryption and authentication solutions that protect against counterfeiting, cloning, software compromise, physical machine compromise, and man-in-the-middle attack, designed specifically for the embedded and M2M (machine-to-machine) market.

The unprecedented security platform protects integrity of data-at-rest, data-in-motion, data-in-use, and data-in-change as it is created, viewed, edited, shared, stored, and moved across communications channels and through the Cloud. The encryption is HIPAA, HITECH, and FDA compliant.

MerlinCryption offers full-scale encryption platforms for M2M, authentication, and enterprise, as well as eleven stand-alone software programs for Information Security professionals. MerlinCryption is changing the way the world protects data and secures connectivity.

About Paul Prem Sobel

Paul Prem Sobel graduated with honors with a B.S.E.E. Electrical Engineering from Pratt Institute, and an M.S.E.E. Electrical Engineering from California Institute of Technology.

As a college intern Sobel identified a recurrent problem in IBMs testing system that saved the company $ 1 million per year. NASA recognized him with an individual commendation for his automation of spacecraft programming on planetary probes.

His security work encompasses log management, NAC, super computer design, graphical and audio presentation of Big Data in eleven or more dimensions, and image processing. He has held chief scientist/principal engineer positions at Xerox, Northrop, Intel, Vitesse, Phillips, and AMD.

Leave a Comment

You must be logged in to post a comment.

Recent Posts

I2C Bus for ATtiny and ATmega

I2C Bus for ATtiny and ATmega

I love the Atmel AVR microcontrollers! Since building the Ghetto Development System described in thi[...]
Interfacing GY 26 with atmega640

Interfacing GY 26 with atmega640

Hello friend once again with new instructable in this I will show you how to interface GY 26 with UA[...]
Using Atmega32 with Arduino IDE

Using Atmega32 with Arduino IDE

Over time I have used all kinds of Atmel microcontrollers in various projects. One of the mos[...]
Standalone Arduino / ATMega chip on breadboard

Standalone Arduino / ATMega chip on breadboard

Step 1: Parts needed I bought my parts from Digikey and Sparkfun Electronics - they're 2 of my favo[...]
Burning atmega328-pu and atmega328p-pu bootloader

Burning atmega328-pu and atmega328p-pu bootloader

Burning the boot loader in an atmega328 could be somewhat tricky but if u follow these steps correct[...]

Read more:
Credit card companies seek new ways to increase payment security