Polymorphic Encryption Protocols (PEP)

22 downloads 0 Views 3MB Size Report
Polymorphic Encryption Protocols. (PEP). Rethinking encryption protocols in protecting data. Michael Kangethe. (Mich01). AfricaHackON2015 ...
Polymorphic Encryption Protocols (PEP) Rethinking encryption protocols in protecting data Michael Kangethe (Mich01) AfricaHackON2015

#woami ●

Assistant Lecturer, Infosec Enthusiast



Bsc IT, Msc Computer Science



Artificial Intelligence, Algorithm Research

Application Demo



PolyHash.jar (Beta Version)

Q&A ●

Encryption



Passwords



Why Encrypt

Data States l

l

Data in transit (Communications i.e Chats, Calls, Service Requests etc) Data in storage (Files, DB)

Current Process Provide Key

Data in Plaintext

Encrypt (Encryption Algorithm) On Plaintext Data

Data in CypherText

Provide Key(Optional)

Data in PlainText

Decrypt (Reverse Process) Data

It's ALL LINEAR But Could Be Non Linear

Data/File

Split Files

Encrypt Files

Merge Encrypted Files

Split New Encrypted File Encrypt New Split Files

Merge New Encrypted Files

Data/File (Plaintext)

Split Encrypted Files

Decrypt Split Files

Merge Decrypted Files

Split Old Decrypted Files

Decrypt Files

Merge Decrypted Files (Get Original File)





Unique Key_File: For each chunk(Segment) –

Created :- Encryption(Unique to Chunk)



Used

:- Decryption

Final Trigger_File –

Created :- After Encryption Completes



Used

:-For Decryption

Keep Calm you will be Hacked ● Or You Might Be Hacked ● Ok There is A possibility of you being Hacked ●

SECURITY IS AN ILLUSION

Aim Make Current Cryptanalysis Techniques Impractical ● Take Advantage of Non Linear approaches ● Applicable to All Encryption Algorithms ● But Preferable in Block Cyphers ●

The END!!...

OH…. Demo..!