FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
info@lesantint.com
THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY! FOR THE FIRST TIME - - PowerPoint PPT Presentation
THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY! FOR THE FIRST TIME IN THE WORLD! info@lesantint.com THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY! RMZ ENCIPHERING SYSTEM FOR THE FIRST TIME IN THE WORLD! RMZ IS THE FIRST IN THE WORLD A1
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
info@lesantint.com
RMZ IS THE FIRST IN THE WORLD A1 LEVEL CRYPTOGRAPHIC PROTECTION SYSTEM WITH ABSOLUTE STABILITY. RMZ ENCIPHERING SYSTEM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
«А1» level is the highest protection level in the world which ensures national and military safety of the countries. Cryptographic system with absolute stability is a system which can be deciphered never and by nobody at any level of science and technology
supercomputers and quantum computers. CLAUDE SHANNON RMZ ENCIPHERING SYSTEM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
«A1» LEVEL OF PROTECTION! CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY! QUANTITY OF KEYS: 10 5 000 ! ANY LENGTH OF THE KEY! ANY SIZE OF THE CIPHERED BLOCK ! TRUE RANDOM NUMBER GENERATOR! THE MULTIUSER MODE WITH UNLIMITED NUMBER OF USERS! REAL TIME MODE! SOFTWARE OR MICROCHIP! «FRIEND-OR-FOE» MODE! DIGITAL SIGNATURE! AUTHENTICATION! PROTECTION OF THE DIGITAL MOBILE COMMUNICATION! PROTECTION AGAINST EMULATION AND PENETRATION INTO A NETWORK! CIPHERING OF ALL TYPES OF FILES ! PROTECTION OF BANK CARDS ! ELECTRONIC MONEY, ETC…
CAPABILITIES OF THE RMZ SYSTEM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
You can make request on:
supercomputers and quantum computers!
RMZ ENCIPHERING SYSTEM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
In 1918 Gilbert Vernam and Joseph Mauborgne theoretically developed the first top secret mode of information transmission which was called the Vernam chiper. Gilbert Standford Vernam (1890-1960, the USA) is an american telecommunication engineer, the employee of the Bell Laboratories. He is best known for the fact that in 1917 working in the field of cryptography he invented the improved polyalphabetic stream cipher and introduced the successful innovation (a pad) with one-time keys using the so-called Vernam chiper for which absolute cryptographic secure is proved.
RMZ IS THE ONLY CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
However, (before the RMZ system) no one could implement absolutely secure system in practice, because serious difficulties were faced. Some of these difficulties are the creation and transfer of the large secret key needed each time to transfer new
communication channel which privacy would be assured by principles of physics. For the first time in the world the solution of the task on creation of absolutely secure cryptographic system of information protection without existence of a confidential communication channel was realized in the RMZ system: «each user generates byte/multibyte absolutely random, evenly distributed, ever-changing, superlong key (more than the file length) which is used only once and is not transmitted on communication channels». In 1949 Claude Shannon proved the theorem that the cryptosystem is ABSOLUTELY secret if the secret key:
RMZ IS THE ONLY ABSOLUTELY SECURE CRYPTOGRAPHIC SYSTEM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE CRYPTOGRAPHIC SYSTEM IS ABSOLUTELY STABLE IF: 1.The key is truly random. 2.The key length is not less than the encrypted message. 3.This key is used only once. CLAUDE SHENNON.
RMZ SYSTEM FULLY MEETS THESE REQUIREMENTS!
The RMZ generator generates truly random keys! See the RMZ generator description below! The RMZ technology allows to create keys of any length! I.e. the key length not less than encrypted message! Quantity of independent random keys in the RMZ is 105 000! Such quantity of keys allows to use each key only once!
ABSOLUTE STABILITY OF THE CRYPTOGRAPHIC SYSTEM RMZ!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
STABILITY OF SYMMETRIC CRYPTOSYSTEMS TO CRYPTOANALYSIS ACCORDING TO THE C. SHANNON’S THEORETICAL - INFORMATION APPROACH
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
STABILITY OF SYMMETRIC CRYPTOSYSTEMS TO CRYPTOANALYSIS ACCORDING TO THE C. SHANNON’S THEORETICAL - INFORMATION APPROACH
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
STABILITY OF SYMMETRIC CRYPTOSYSTEMS TO CRYPTOANALYSIS ACCORDING TO THE C. SHANNON’S THEORETICAL - INFORMATION APPROACH
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
IDEALLY STABILITY CIPHER it is a cipher if it is impossible to define unambiguously a open text at a known ciphertext of arbitrarily large length (the completely stability cipher becomes the ideally stability cipher). ABSOLUTELY STABILITY CIPHER it is the cipher if the key is a fragment
equal to length of the original message and this key is used only once and then this key is destroyed (it is impossible to hack the cipher even if the cryptanalyst has unlimited resources of time and unlimited set of computing resources). Thus a necessary and sufficient condition of absolute stability cipher is:
THE RMZ CRYPTOSYSTEM NOT ONLY MEETS THESE REQUIREMENTS BUT ALSO REPEATEDLY SURPASSES THEM! STABILITY OF SYMMETRIC CRYPTOSYSTEMS TO CRYPTOANALYSIS ACCORDING TO THE C. SHANNON’S THEORETICAL - INFORMATION APPROACH
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
completely security, i.e. the existence of cryptosystems in which the cipher does not give any information about the open message (except its length). This is possible only if the number of possible keys is also large as the number of possible messages. QUANTITY OF THE INDEPENDENT ABSOLUTELY RANDOM KEYS IN THE RMZ SYSTEM: 10 5 000 The RMZ cryptosystem for the first time in the world showed the practical implementation of cryptosystem with the absolute stability that is a scientific break in the cryptography! Realization of the absolute stability of the RMZ cryptosystem is a merit of the developed new mathematical apparatus! This mathematical apparatus for the first time in the world completely simulates the condition, structure and functioning of the physical vacuum. This development is a closed scientific achievement which will not be published in the coming years. STABILITY OF SYMMETRIC CRYPTOSYSTEMS TO CRYPTOANALYSIS ACCORDING TO THE C. SHANNON’S THEORETICAL - INFORMATION APPROACH
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ EXCEEDS ALL EXISTING CRYPTOGRAGHIC SYSTEMS IN THE WORLD
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ EXCEEDS THE NATIONAL SECURITY OF THE USA: 1) 109 times in time of penetration into a network; 2) 1010 times in time of deciphering.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
A1 LEVEL OF THE USA NATIONAL SECURITY PGP, RSA, GOST28147-89, AES, BLOWFISH, ETC. ANTI-VIRUS SYSTEMS, ETC.
109 ÷ 1010
RMZ IS THE FLAGMAN OF THE PROTECTION SYSTEMS!
Statistically, because of imperfection of modern security systems of data annual losses in the world (connected with data stealing, hacking, malicious viruses effect and so on) make up 1.2% - 2% of the world GDP that will constitute in money equivalent:
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Edward Snouden's statements confirm that currently the best encryption algorithms lost the cryptographic security. There is a set of special programs (PRISM(USA), TEMPORA(UK), etc.) which freely supervise all flow of information in the world thanks to application of supercomputers and quantum computers. According to the statement of intelligence agencies, the PRISM, TEMPORA programs are destined to fight against crime, terrorism, etc. But the danger of such systems as PRISM, TEMPORA and similar is that intelligence agencies have been using these programs for a long time for:
THE WHOLE WORLD IS UNDER CONTROL
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
«TIANHE-2». China. 33,86 petaflop. «GRAY TITAN». USA. 17,6 petaflop. «SEQUOIA». USA. 17,2 petaflop. SUPERCOMPUTERS OF THE WORLD
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
«K». Japan. 10,51 petaflop. «MIRA». USA. 8,6 petaflop. «STAMPEDE». USA. 5,2 petaflop. SUPERCOMPUTERS OF THE WORLD
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
«JUQUEEN». Germany. 5 petaflop. «VULCAN». USA. 4.3 petaflop. YOU CAN CHECK OUT OTHER MODELS IN TOP-500 LIST OF SUPERCOMPUTERS OF THE WORLD. SUPERCOMPUTERS OF THE WORLD
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
The exponential computing speed increase of a quantum computer on the number of qubit in its processor really alarmed the "secret" world community. Google, NASA, Lockheed Martin are beginning to use a quantum computers. The Google engineers are going to create a new quantum algorithms of high-efficiency search system. The American Space agency and the Google company have joined the growing list of clients of the Canadian company D-Wave which will soon start using the latest D-Wave Two model of a quantum supercomputer.
QUANTUM COMPUTERS
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
D-Wave. http://www.dwavesys.com Canada. «Two». 512 quantum bits.
A quantum computer with 300 quantum bits processor performs simultaneously 2∙1030
For comparison, if we take each atom in the known Universe and turn it into a bit of classical supercomputer then all the atoms will not be enough to reach the computing power of a 300-qubits quantum computer. So, a new quantum computer with 300 quantum bits processor can get ahead of a supercomputer the size of the Universe (diameter of the quantum processor is less than 1 mm). During the demonstration the quantum computer D-Wave completed over capacious Ramsey task only within 270 milliseconds!!! A quantum computer can factor the number consisting of N number position in N2
(PGP, RSA, etc.) unusable.
QUANTUM COMPUTERS
As none of the cryptosystems (except RMZ) is difficult for supercomputers and quantum computers, then all the existing systems of password access, data authentication, encrypting systems and also systems of banking transactions completely lose their meaning and require a drastic modification.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
A NEW ERA OF SUPERCOMPUTERS AND QUANTUM COMPUTERS
A new era of supercomputing and quantum computers began! All the best encryption system (PGP, GOST28147-89, RSA, AES, DES, etc) and even those encryption system which provide the national security of the countries have lost their cryptographic strength! Only the cryptosystem with absolute stability can resist against supercomputers and quantum computers! The RMZ cryptosystem is the only cryptosystem in the world with absolute stability!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Hacking time of the RMZ with the length of the key 256 bytes using a supercomputer (1 petaflop) and a quantum computer is:
107 YEARS.
You can download the RMZ files yourselves and test them on the hack! Hacking time of the top cryptosystems (PGP, RSA, AES, GOST 28147-89, BlowFish, DES, etc.) with the maximum length of the key using a supercomputer (1 petaflop) and a quantum computer is:
0.5 ÷ 1 MIKROSECOND.
* for each cryptographic algorithm (except RMZ) is the own mathematical methods of the accelerated hacking with the use
hacking by direct search (“forehead”) is already irrelevant!
HACKING DURATION OF CRYPTOGRAPHIC SYSTEMS
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Hackers have made havoc in the Pentagon, when they had reached the largest secret nuclear program of the American Defence Department. The hackers have stollen the data about new multi-mission fifth-generation «Joint Strike» fighter which is able to carry nuclear weapons. The project on its creation costs 300 billion dollars. The cost of
has already started to count the losses. A group of hackers has broken into the computer system of CERN (European Nuclear Research Center). This is an organization that manages Large Hadron Collider project (LHC) according to the Daily Telegraph. The CERN scientists were worried by this cyber-attack because the hackers were really close to the computer system contolling
had broken the computer system of the second level they would have been able to deactivate CMS partially.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Hackers have stolen space secrets of the Pentagon. The Pentagon brass admitted that they had been attacked by hackers who had committed the largest data theft in the world. The databases of such companies as Amazon, Citigroup and Barclaycard were stolen by unknown hackers. The mail server of the Epsilon company was attacked by hackers. The company is engaged in the internet-market researching (the Daily Telegraph reports). One of the largest financial groups in the world Citigroup Inc reported that hackers had broken one of its corporate networks and got access to personal data of hundred thousands of bank card owners (the Financial Times reports).
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
The computer network of unmanned aerial vehicles of the US Air Forces controlling the operation of Predator and Riper unmanned air vehicles abroad and in Irag and Afghanistan in particular, was damaged by a virus as the American Wired Magazine reports. Predator and Riper unmanned air vehicles are armed with rockets and bombs and ground-controlled by the satellites but they can be manned autonomy.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
On December 8, 2011 Iranian military managed to seize control over American remote piloted spy RQ170 Sentinel, and then to land it safely on one of their aerodromes. RQ170 Sentinel is the recent development of one of the divisions of Lockheed Martin company. The USA has already started to count the losses due to lost technologies that will be known to other countries. George W. Bush: «Terrorists have an opportunity to listen to almost any of our phone calls…».
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
In early January 2012 the Group-XP hackers’ group from Saudi Arabia made a cyber-attack on Israel. As a result of this attack stolen data of 400 000 clients
codes, personal data of bank card owners and etc.) on the cracked Israel site one.co.il. Banks blocked the operations from all customers’ credit cards and promised to compensate for financial losses in case of the theft of funds. Banks operation on card accounts is blocked. Experts say that this is the largest theft of data in the country.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Hackers have broken open the site of the US Department of Justice. The responsibility for attack was claimed by the hacker grouping Anonymous. Hackers have got access to the data on all crimes committed within the USA including computer sphere, 1,7 Gb in total. Thus through social network Twitter representatives
information and posted it for the public access. Earlier Anonymous had already made attacks on sites
Nintendo, the site of the US Senate and also the governmental resources of Brazil, Mexico, Italy.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
PRISM is a system of total surveillance of United States which allows you to collect and store giant digital data streams around the world. PRISM system has powerful stations and data centers to decrypt all the data. PRISM system makes monitoring
e-mail communication, phone calls, sms, video chats, web sites, skype, financial transactions, etc. The RMZ system is the only system of information security in the world which cannot be decrypted by PRISM system!!!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Using the services of these companies you are under control of the «PRISM» system!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
The Tempora system of Great Britain is an analog of PRISM system of the USA. The Tempora system also exercises total control over information in the world. 20 petabytes of information adjudged in the "network" Tempora every day. For an example, all archive of the Internet for October 25, 2012 contains about the 10th petabyte of data. GCHQ skips through Tempora 600 000 000 "telephone facts" and at the same time "monitors" the information from the 200 FO cables. Including, the British GCHQ intercepts information from 46 transatlantic cables.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
According to the Wall Street Journal the largest hacking scam in the U.S. history is: a group of four Russian and one Ukrainian hackers cracked the internal network of the American Stock Exchange NASDAQ and several large companies, including Citibank and 7-Eleven. During seven years (since 2005!) they had been downloading the data of more than 160 million credit cards and caused losses of more than $ 300 million. July 25, 2013.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
According to Edward J. Snowden’s documents, the National Security Agency of USA (NSA) is engaged in the cracking of the most popular encryption methods and infiltration of brittleness into popular internet services. The Secret Intelligence Service of Britain is helping NSA to spy within the framework of the program. James R. Clapper (the head of NSA) intends to bypass all known encryption techniques! In the framework of the program codenamed Bullrun NSA is handling cryptanalysis and applying its results practically. NSA is cooperating with engineering companies to create its own network access point into their products.
James R. Clapper, the head of NSA.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
NSA finds its deciphering ability vital to compete with Russia, China and other countries. “In future supercountries will be broken or created, basing only on power of their cryptoanalytical programs (the 2007 year document says). This is the admission price
“We are investing in the innovating cryptanalytical capabilities to win a contest with cryptography and use an Internet traffic for own purposes” (James R. Clapper wrote in his budget call for the present year).
James R. Clapper, the head of NSA.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
NSA also spends more than 250 million dollars annually for the «Sigint Enabling Project» which “is extensively involving home and foreign companies to secretly effect and/or publicly use their commercial products as operating units”. Sigint has an acronym from “signals intelligence” in the name of the project, i.e. electronic intelligence. In the framework of this project NSA is planning to get a full access to an unnamed significant service of internet calls and sending messages, a certain internet service in the Middle East and communications of three foreign governments.
James R. Clapper, the head of NSA.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
the private data (trade secrets and medical records), emails, inquiries in Search Engines, internet chatting and phone calls of American people and other people all over the world. According to another documents turned over by Edward J. Snowden to the journalists of The Guardian and The New York Times the National Security Agency of USA evaded the protection and cracked the encryption methods used in the world trading and banking system and protecting
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
USA was spying the whole Latin America, Germany, China, Iraq. NSA has an opportunity to bug phone calls of the countries’ presidents and all the leadership. American secret service was bugging 38 embassies and legations
and Washington. NSA listened to European Union representation in Washington, headquarters of the UN and EU Council in Brussels..
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
NSA is able to get an access to the data of any smart phone regardless of its operating system (iOs, Android, BlackBerry, etc.). The German magazine Spiegel wrote about this making reference to the documents of NSA. As a result NSA gets an access to the contact lists, text messages, data of tablets; NSA can fix the position
American court officially allowed to American secret service to continue collection of the data about phone calls.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
All these information talk about the deplorable state of the existent systems of defence of leading countries of the world, none of their systems of defence is able to resist kiber war. RMZ CRYPTOGRAPHIC SYSTEM is the unique in the world protection system which can stop any cyber attack. If all users get an access to supercomputers, quantum computers now then protection systems of banks, companies, military facilities, national security of all countries of the world will fall at once. Therefore, in today's world we have a situation in which the current protection systems of the leading countries of the world (even military and national security) are extremely fragile and are behind the current level of technology and science development that represents huge real and potential threat. Failure or hacking of military protection could lead to nuclear war and the destruction of the world. There are already precedents of access attempts from outside to the strategic arms of the leading countries of the world.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
PRISM (USA) GCHQ (UK) TEMPORA HACKERS MALICIOUS SOFTWARE
ABSOLUTE PROTECTION OF THE RMZ SYSTEM
NSA (USA)
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
QUANTUM COMPUTERS, SUPERCOMPUTERS
A - key length B - quantity of keys C - quantity of algorithms D - quantity of the users E - protection of station F - quantity of the passwords in multi-user mode
RMZ Systems of protection of national security of the world leading countries AES PGP A B C D E F
COMPARISON OF DIFFERENT PROTECTION SYSTEMS
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
109 108 107 106 105 104
. . .
10 RMZ Systems of protection of national security of the world leading countries AES PGP
RMZ is 109 times better than the A1 Level of the USA National Security! (penetration into a network)
network
COMPARISON OF DIFFERENT PROTECTIVE SYSTEMS (PROTECTION AGAINST PENETRATION INTO A NETWORK)
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ Systems of protection of national security of the world leading countries AES PGP
1010 109 108 107 106 105 104
. . .
COMPARISON OF DIFFERENT PROTECTION SYSTEMS (PROTECTION AGAINST DECIPHERING) RMZ is 1010 times better than the A1 Level of the USA National Security! (protection against deciphering)
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
K
1020 1019 1018 1017 1016 1015
. . .
PROTECTION OF THE BANKING INFORMATION, NETWORKS, PLASTIC CREDIT CARDS.
The RMZ system is 1020 times better than the best bank protection systems!
K
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ IS UNIQUE IN THE WORLD CRYPTOGRAPHIC SYSTEM WHICH PROVIDES ABSOLUTE PROTECTION OF MULTIUSER NETWORK WITH UNLIMITED NUMBER OF USERS IN REAL TIME.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ IS THE ONLY SYSTEM IN THE WORLD THAT PROVIDES PROTECTION FOR DIGITAL PHONE NETWORKS AND TELECOMMUNICATION SYSTEMS FROM OVERHEARING AND EMULATION.
All other ciphering systems ( RSA, GOST, etc.) do not make sense in cryptosmartphones: They are easily deciphered by the national security environment in real-time mode! They have big troubles in sound transmission! They mutilate voice, etc.!
DURING THE OPERATION OF THE RMZ SYSTEM IN THE TELEPHONE: Authentification of a handset and user! The keys are not transferred! The initial data is not transferred! There are no troubles during the transmission of sound! There is no voice mutilation! Great operation speed (real-time mode) ! Deciphering by the national security environment is impossible! Emulation is not possible!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ PROTECTS YOUR BUSINESS FROM UNAUTHORIZED ACCESS FROM OUTSIDE
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ PROTECTS DATABASES IN THE MULTIUSER MODES
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ SYSTEM IS CAPABLE TO PROTECT BANK CARDS DUE TO:
unlimited number of users,
RMZ SUPPORTS PROTECTION OF THE BANK CARDS
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ microchips can be integrated into any bank equipment: modem, server, hard drive, usb-drive, network card, phone, smart banking cards, ATM, satellite, cryptophone, etc. MICROCHIP RMZ
INTEGRATION OF THE RMZ INTO THE BANK EQUIPMENT
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
CIPHER RMZ Banking smart card with the RMZ chip ATM Computer Server ATM Server
PROTECTION OF THE BANKING SYSTEMS AT ALL LEVELS!
CIPHER RMZ CIPHER RMZ
INTEGRATION OF THE RMZ INTO THE BANK EQUIPMENT
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
REMOTE INTERNET CLIENT SERVICE PROTECT DATA FROM INTERNAL EMPLOYEES OF THE BANK
THE RMZ SYSTEM SOLVES BOTH OF THESE PROBLEMS ! ! !
«In fact payments which pass through the Internet bank aren't protected, if desired it is possible to take away money from the accounts from 99 % of users», – declared, speaking at the XI International forum of iFin « Electronic Financial Services and Technologies in Russia », the director general Websafer.ru Vladimir Vorochenko. A study conducted by Sailpoint Technologies in the USA, UK and Australia showed that of the 3,500 employees surveyed (insiders in fact) a sufficiently large number are able and willing to steal sensitive information from their companies for personal gain: 22% in the U.S. 29% in Australia and about half of the respondents in the UK.
TWO MAJOR BANKS’ UNSOLVED PROBLEMS
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THESE ATTACKS ARE IMPOSSIBLE IF YOU HAVE AN RMZ MICROCHIP IN YOUR PHONE !!! Intuders can remotely break not only your computer but your mobile telephone as well. According to Karsten Nol (a well-known speacialist on computer security): «We can remotely set up a software into a mobile of the victim and this software will work absolutely regardless of the telephone. We can spy on you. We can get your
MOBILE PHONES’ EXPOSURE IN BANKING OPERATIONS
cryptokeys used for the ciphering of phone calls. We can read your text messages. Except for just spying we can steal very important data about an owner (also with the help of text messages) from a SIM card your mobile personality and withdraw money from your account».
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
The technology RMZ allows to create a device «MOBILE ONLINE BANK» («MOB»). The «MOB» is a hardware-software complex
«MOB» is a specialized independent mobile device with Internet access. «MOB» is a new stage of development of the Internet-Banking. The use of Internet banking on home computers and mobile phones is dangerous, because these devices are not protected from hackers and malicious software. The system «MOB» has none of these disadvantages. The cost of «MOB» makes less than $40 for clients of the bank.
MOBILE ONLINE BANK «MOB»
«MOB» is intended to commit remote bank operations in absolutely protected RMZ system. Absolutely protected Internet Banking is possible only with application
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
«MOB» supports all networks (Ethernet, Wi-Fi, Blue-tools, etc). «MOB» is the next stage of development of the banking industry.
INTERNET
«MOB» OPERATION WITH A BANK IN THE INTERNET
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
With the help of «MOB» Internet Banking can perform any operations in the absolutely protected mode (at home, on the road, on rest and so on). «MOB» is your mobile bank in your pocket with 24 hours access from anywhere in the world.
«MOB» USE
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
USING «MOB» FOR A BANK ALLOWS:
automatic mode.
«MOB» ADVANTAGES
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ IS A UNIVERSAL PROTECTION SYSTEM OF ANY KIND OF INFORMATION
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ IS THE ONLY SYSTEM IN THE WORLD WHICH PROVIDES ABSOLUTE PROTECTION FOR MILITARY NETWORK-CENTRIC TECHNOLOGIES «FRIEND-OR-FOE» MODE
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ IS THE ONLY SYSTEM IN THE WORLD WHICH PROVIDES ABSOLUTE PROTECTION FOR MILITARY NETWORK-CENTRIC TECHNOLOGIES
Network-centric warfare (or «network-centric military operations», «network-centric operations») is a new military doctrine (or operating concept) which was used for the first time by the United States Department
The network-centric concept provides granting to participants of operations of reliable and full information about a situation in real time. Thereby achieved acceleration
rate of operations, efficiency of defeat of forces of the
synchronization of operations is reached.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Network-centric warfare and cyberwarfare are the concepts which became a reality in the XXI century. The U.S. has already «...adapted their armed forces to conduct network-centric warfare», that requires absolute dominance in cyberspace. The robotized aviation wing of the Navies
a low-observable unmanned aircraft-killer with a jet engine which will be stationed at aircraft carriers and will fly together with managed fighter aircraft.
RMZ IS THE ONLY SYSTEM IN THE WORLD WHICH PROVIDES ABSOLUTE PROTECTION FOR MILITARY NETWORK-CENTRIC TECHNOLOGIES
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
It should be noted that without the RMZ system safe management of such unmanned aircrafts is impossible! On December 8, 2011 Iran intercepted management over the American prospecting UAV RQ170 Sentinel aircraft and then without prejudice landed him at its airport.. RQ170 Sentinel is the recent development of one
The USA already started counting damage from the lost technologies of this UAV which become known to other countries.
RMZ IS THE ONLY SYSTEM IN THE WORLD WHICH PROVIDES ABSOLUTE PROTECTION FOR MILITARY NETWORK-CENTRIC TECHNOLOGIES
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ PROVIDES THE SAFE MODE OF OPERATION OF UNITS IN THE NETWORK-CENTRIC MILITARY SYSTEM «FRIEND-OR-FOE» MODE
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ PROVIDES ABSOLUTELY PROTECTED CONTOROL CHANEL OF STRATEGIC WEAPON. INTERCEPTION OF CONTROL IS IMPOSSIBLE! «FRIEND-OR-FOE» MODE
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
MANAGEMENT INTERCEPTION OF OVER UAV IS IMPOSSIBLE! ONLY SYSTEMS WITH A1 LEVEL PROTECTION PROVIDE THE «FRIEND-OR-FOE» MODE!
«FRIEND-OR-FOE» MODE OF THE RMZ SYSTEM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ PROVIDES PROTECTION OF SATELLITE SYSTEMS AND COMMUNICATION CHANNELS «FRIEND-OR-FOE» MODE
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ ADVANTAGES FOR MILITARY COMMUNICATION SYSTEMS
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
1. Identifying of objects in the network-centric system. 2. Absolute protection of the communication system :
RMZ technology : RMZ can operate in real time in an ordinary mobile phone.
6. Access to the lithographic matrix of the RMZ microchip is impossible (40 nm technology). 7. Unlimited quantity of users in the network.
RMZ PROVIDES PROTECTION OF RADIO CHANNELS OF COMMUNICATION
100% OF MILITARY NEGOTIATIONS ARE BUGGED BY ENEMY! IT LEADS TO THE HUGE LOSSES IN THE BATTLE!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
ONLY THE RMZ SYSTEM IS CAPABLE TO PROTECT FROM HACKERS RMZ IS THE №1 PROTECTION SYSTEM IN THE WORLD
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
HARDWARE - SOFTWARE IMPLEMENT OF THE RMZ SYSTEM (MICROCHIP)
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ SYSTEM IS ABLE TO PROTECT BIOMETRIC DATA OF A BIOPASSPORT IN THE MICROCHIP!
THE RMZ MICROCHIPS IN BIOPASSPORTS
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RMZ is a cryptographic system with absolute stability because in RMZ a number of mathematical KNOW-HOWS was solved for the first time in the world. RMZ is a cryptographic system with absolute stability because only the RMZ generator carries out superstrong tests.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
MATHEMATICAL KNOW-HOWS OF THE RMZ SYSTEM
data».
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
functions».
MATHEMATICAL KNOW-HOWS OF THE RMZ SYSTEM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
tasks are solved (two mutually exclusive processes are carried out at the same time):
random generated passwords:
(optimal sufficient length of the password is 256 - 28 672 bytes)
MATHEMATICAL KNOW-HOWS OF THE RMZ SYSTEM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
TEST NO. 1. «CHECK ON THE FREQUENCIES». TEST NO. 2. «CHARACTER-ORIENTED CHECK». RMZ IS THE ONLY CRYPTOGRAPHIC SYSTEM IN THE WORLD THE GENERATOR OF WHICH PASSES THESE SUPERSTRONG TESTS! These tests are described in the book «Theory, Application and Assessment of Quality of Generators of Pseudorandom Sequences» (the book 2; M.A.Ivanov, I.V.Chugunkov; «KUDITS–OBRAZ» Publisher; Moscow; 2003). SUPERSTRONG TESTS OF THE RMZ GENERATOR
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
SUPERSTRONG TESTS OF THE RMZ GENERATOR
Z
Only the generator of the cryptographic RMZ system passes this test !!!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
SUPERSTRONG TESTS OF THE RMZ GENERATOR
Z
Only the generator of the cryptographic RMZ system passes this test !!!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
The RMZ basis is the generator of random numbers which generates random, equally distributed, byte/multibyte sequences which self-organize above a field of real numbers. The RMZ generator is based on self-organizing, random, open/semiopen N- dimensional sets which can multiply (similarly to the living cells) and which never lose their structure (never degenerate) in the infinite N-dimensional space (similarly to the N-dimensional, embedded, linked, random fractals).
ВПЕРВЫЕ В МИРЕ! АБСОЛЮТНО СТОЙКАЯ КРИПТОСИСТЕМА!
THE RMZ GENERATOR
Self-organizing is a process during which the organization of complex dynamic system is created, reproduced or improved. Processes of self-organizing can take place only in the systems having a high level of complexity and a plenty of elements, communications between which have not rigid but random character. Processes of self-organizing occur due to reorganization of existing and formations of new communications between elements
at the same time natural, spontaneous character (these processes proceeding at the time
relatively independent from it). The properties of self-organization are present in a wide range of objects of nature: a living cell, organism, a biological population, biogeocoenosis, the human team, etc.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
Absolute uniformity of random byte/multibyte field allows to implement bit
At each step of work of the generator new random keys are developed and on the other piece of a file there is a bit-by-bit operation of scrambling. The length of a piece of a file and length of keys is limited by nothing! THIS OPERATION IN SUCH IMPLEMENTATION IS IMPOSSIBLE FOR OTHER ENCIPHERING SYSTEMS !!!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
Absolute uniformity random byte/multibyte field allows to realize a nonlinear
transformation), byte or bit replacement (the length of the block can reach tens kilobytes). At each step of work of the generator new random keys are developed and the table of replacement is updated . The replacement tables form by random image. Quantity
replacement tables is equal to the quantity
keys in the system = 10 5 000. THIS OPERATION IN SUCH IMPLEMENTATION IS IMPOSSIBLE FOR OTHER ENCIPHERING SYSTEMS !!!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
ABSOLUTELY UNIFORM DISTRIBUTION OF THE NUMBERS IN THE RMZ The result of work
uniformity of numbers from 0 to 255 in the gamma with a length of several Mb.
small chaos on an uniform sequences.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
ABSOLUTELY UNIFORM DISTRIBUTION OF THE NUMBERS IN THE RMZ As seen from the graph, only the RMZ cryptosystem has an absolute uniform distribution of keys! Therefore, RMZ is the
cryptosystem in the world whose generator performs two super difficult tests: Test №1. «Check on the frequencies». Test №2. «Character-oriented check».
These tests are described in the book «Theory, Application and Assessment of Quality of Generators of Pseudorandom Sequences» (the book 2; M.A.Ivanov, I.V.Chugunkov; «KUDITS–OBRAZ» Publisher; Moscow; 2003).
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
All other cryptosystem have not the absolute uniform distribution of the numbers as in the RMZ cryptosystem, i.e. on the graphs of distribution of numbers of all other cryptosystems there are surges on which the cryptanalyst can hack the cipher by means of special mathematical methods, super computers, quantum computers!
G Transformat data CIP-DEC INITIAL DATA
Absolutely uniform distribution
the numbers in the RMZ cryptosystem does not allow to make cryptanalysis by means of the special mathematical methods, supercomputers, quantum computers! It is impossible to hack the RMZ cipher!
RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
The RMZ Generator is implemented on the new class of mathematical functions
(probabilistically determined self-organized structures).
The generator allows to develop sequences for other operations of enciphering
either: summation on module N, multiplication on module N and some other (convertible and even irreversible operations; convertible with the help of specially developed keys during deciphering). After enciphering with these operations any data turns to a «bit dust» !!!
The generator is automatically established into any point of the space, the new
file is ciphered by other random never repeating keys. It is not necessary to place the generator deliberately.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
Each user forms the random initial data (5-50) kb (depending on algorithmic
basis) which is the basis of work of the generator. In case of work with an universal key the provider supplies for each user his initial data which are formed automatically and can be placed within the chip as well as the universal key within the chip . The initial data is never transmitted through the networks and can serve to a user all the years of working with the RMZ.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
The initial data can be stored even in the ciphered kind without storage of a key of
infinite space and it is impossible to calculate it out by sorting).
Deciphering of the initial data takes place in a body of the program that doesn't
allow to create dump of memory (protection from losses of the initial data). Absolute protection of the initial data and the algorithm of the program against hacking in the RMZ microchip. The generator allows to originate the random numbers similar obtained with the help of irreducible polynomials over Galois Field but in any range with the infinite period of repetition and in any functional environment.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
The system allows to create random N-dimensional in space byte/multibyte
length key at the output which allows to realize various linear/nonlinear operations of enciphering at all bit field of the file and perform block-by-block or bit-by-bit encryption of any quantity of bits/bytes arriving on an entrance. Keys are formed by users or provider. The initial data can be stored in the ciphered kind in the computer and deciphering goes on the N-dimensional image.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
Cryptographic strength is also defined by:
In the process of formation of the keys there is a multifold process of nonlinear display with ruptures of the first and second kind one set into another; the special mathematical operations are realized, this operations are the conversion of N- measured latch hooks into random distributed spaces (all conversions are irreversible).
Nonlinearity of generator and methods of transformation is extremely high: to
change the initial data to one bit (of any byte) is just enough to make deciphering impossible (formation of the random spaces goes the other way (other random keys).
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
Nonlinearity of the transformation of the data can be brought up to the huge sizes too: during changing of the ciphered data on one bit (of one byte) at the block cipher and deciphering of the block will be impossible.
Unlike many cryptographic systems RMZ is based on the random number
generator that outperforms other generators which based on irreducible polynomials
The range of the numbers elaborated by the RMZ generator is limited by nothing (0 - 255, 0 - 511, 0 - 1023, etc.), that's why the system can work with ANSI and with UNICODE.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
The RMZ generator and the RMZ system are easily implemented by hardware and can be installed into a small portable digital hardware and plastic cards. There are no small portable radio telephones, cellular telephone, radio stations and plastic cards nowadays which secure the same protection and the multiuser mode.
The RMZ system allows to create completely protected computer networks based
the software and hardware (at the same time the RMZ protection is higher than the A1 level national protection of the USA).
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
The RMZ generator has a superhigh algebraic complexity and a great degree of unlinear structure (all parameters of the generator can be changed to any direction reducing the unlinear structures to absolutely any high power). The RMZ generator is a N-dimensional irreversible function! The internal structure of the generator allows to realize a great number of different algorithmic constructions that together with different methods of the data conversion gives a great number of algorithms (for an example: RMZ1, RMZ2,…,RMZ200,…). RMZ1, RMZ2,…,RMZ200,… - there are completely different cryptographic systems which do not decrypt each other! The RMZ generator and protection system RMZ not amenable to modern methods of cryptanalysis!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
The generator allows to generate sequences simultaneously with infinite period and with a step more (3-25):
module N, multiplication on the module N.
linear operation of substitution and stochastic transformation (by blocks of 256, 512, 1024 or more bytes). Quantity of blocks is limited by nothing. Quantity of substitutions which depend on transformed data or don't depend on transformed data from 28! to 232! and more (! is a factorial).
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
by-bit or byte-by-byte shift operation (by blocks of 256, 512, 1024 or more byte; quantity of blocks is limited by nothing). Quantity of substitutions which depend
more (! is a factorial).
composite mathematical non-linear operations.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
THE RANDOMNESS OF KEYS OF THE RMZ CRYPTOSYSTEM. The RMZ cryptosystem has the highest in the world indicators of the Spearman's rank correlation in the absolute uniformity! Correlation and uniformity
distribution in the RMZ generator are regulated in any limits! The Spearman's rank correlation in the absolute uniformity!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
THE RANDOMNESS OF KEYS OF THE RMZ CRYPTOSYSTEM. The table shows that the keys (sequence) generated by the RMZ system are truly random! The truly random key is one of the three conditions of the cryptosystem with absolute stability according to C. Shannon! RMZ generator is the most powerful random number generator in the world! The Spearman's rank correlation in the absolute uniformity!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE RMZ GENERATOR
THE GENERATOR (THE SELF-ORGANIZING PROBABILISTIC DETERMINED STRUCTURE). Entrance module.
THE SIMPLIFIED STRUCTURE OF THE RMZ ALGORITHM
The module of highly nonlinear transformation by means of irreversible functions. The transformation module
Self-organization module. TRANSFORMATION MODULES. Multibyte gamming. N-dimensional bit-by-bit operation of scrambling. N-dimensional nonlinear operation of replacement. Other operations... Exit. N times Encryption. Decryption. The initial data. Modification. Period up to 10 5 000. Installation into any point in space. At the generator output the absolutely uniform, distributed, random sequence
more than1024 bytes is formed. keys
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE CRYPTOGRAPHIC SYSTEM RMZ CAN'T BE HACKED EVEN AT ATTACK OF THE SUPERCOMPUTER AND THE QUANTUM COMPUTER! THE RMZ SYSTEM CAN BE DECIPHERED NEVER AND BY NOBODY AT ANY LEVEL OF DEVELOPMENT OF A SCIENCE AND COMPUTER FACILITIES
ABSOLUTE STABILITY OF THE RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
The best global security systems (key length up to 256 bytes and the quantity of keys up to 10300) which provide national safety of countries and at the same time can't be bought by an ordinary users:
by-bit scrambling of a few kilobits of data by the random never repetitive evenly spaced polymorphic key),
ALL THESE TASKS HAVE BEEN SOLVED IN THE RMZ!
ABSOLUTE STABILITY OF THE RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Corporation IBM, IT&T and others sell a simple security system (they cost about $500 000 000) with key lengths up to 128 bits and the number of keys up to 1040 which is easily deciphered in real time using supercomputers. To create supersystem of protection like RMZ is very difficult and very expensive (ten billions dollars and ten years of work of huge collectives of scientists). It is necessary to solve the most complicated mathematical, algorithmic and program problems which are already solved in RMZ.
ABSOLUTE STABILITY OF THE RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
THE SELF-ORGANIZING PROBABILISTIC DETERMINED STRUCTURES
RMZ exceeds not only all already existing protection systems but also those which are being developed now including ones that are based on irreducible polynomials
Annually the USA spends several billions of dollars for searching Galois irreducible polynomials and developing data protection systems. Irreducible polynomials are the polynomials which are not decomposed into non- trivial (non-constant) polynomials. Galois field (a finite field) is the field which consists of a finite number of elements. However, if irreducible polynomials over Galois Field is known for the cryptanalyst (for example, as in AES), the super computer or quantum computer easily hack such cryptosystem in real time by means of special mathematical methods of accelerated hacking (the method of hacking by direct search (“forehead”) is already irrelevant!)
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
In the best encryption systems that provide national and military security of the countries, at best, used irreducible polynomials over the Galois field. The using of irreducible polynomials over Galois field does NOT allow to:
That is why the use of irreducible polynomials over Galois field doesn't allow to create a cryptosystem with absolute stability!
THE SELF-ORGANIZING PROBABILISTIC DETERMINED STRUCTURES
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
In the RMZ cryptosystem instead of irreducible polynomials over Galois field used self-organizing probabilistic deterministic structures that are the KNOW-HOWS and scientific development of the closed type. These structures of the RMZ cryptosystem allow:
dimensional bit-by-bit operation of scrambling which is not available for other cryptosystems);
All these possibilities of self-organizing probabilistic deterministic structures allow to create a cryptosystem with an absolute stability! More detailed differences of the RMZ cryptosystem from other cryptosystems see in the tables below.
THE SELF-ORGANIZING PROBABILISTIC DETERMINED STRUCTURES
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G O S T B L O W F I S H 1. Protection system of «А1» level. +
2. Absolute stability of the enciphering system according C. Shannon. +
3. Resistance to hacking by the quantum computer. +
4. Resistance to hacking by the nets from super computers. +
5. Resistance to hacking by the super systems «PRISM», «TEMPORA», etc. +
6. «Friend-or-foe» mode. +
7. Generator installation in the any point of space up to 105 000 in real-time mode. +
8. System with nondetermined encryption algorithm. +
THE ADVANTAGES OF RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G O S T B L O W F I S H 9. Closed scientific KNOW-HOW in the mathematical apparatus of encryption algorithm. +
more high-power than sequences created by irreducible multinomials above Galois field. +
to-bit scrambling of few kilobits of information by the random, never repeated equidistributed polymorphous key). +
system. +
system. +
+
THE ADVANTAGES OF RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S Г О С Т B L O W F I S H
+
+
combinations. +
fields. +
create "infinitely" big evenly distributed random sequences. +
+
THE ADVANTAGES OF RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G O S T B L O W F I S H
impossible to figure it out with searching. +
initial data. +
+
+
information (in distinction from other systems user get initial data for term of life). +
communication and so on. +
+
THE ADVANTAGES OF RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G O S T B L O W F I S H
+
+
+
to make deciphering impossible (formation of random spaces is going another way - other random keys). +
+
+
sequences which are independently self-organize above a field of natural series of real numbers and even complex numbers. +
THE ADVANTAGES OF RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G О S Т B L O W F I S H
+
+
+
time with the program performance of encryption algorithm. +
+
(rearrangements) which never repeating (keys never repeat) on all bit/byte field of a ciphered file. At each step of work of the generator new random keys are developed and on the other piece of a file there is a bit- by-bit operation of scrambling. The length of a piece of a file and length of keys is limited by nothing! +
THE ADVANTAGES OF RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G O S T B L O W F I S H
elements of the block of a ciphered file (stochastic transformation), byte or bit replacement (the length of the block can reach tens kilobytes). At each step of work of the generator new random keys are developed and the table of replacement is updated (table of replacement is formed by random image). +
allows to realize various linear/nonlinear operations of enciphering at all bit field of the file and perform block-by-block or bit-by-bit encryption of any quantity of bits/bytes arriving on an entrance. +
first and second kind one set into another and N-dimensional latches for the exit in the random distributed spaces (all transformations in the work of the generator are irreversible). +
+
+
THE ADVANTAGES OF RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G O S T B L O W F I S H
bases for each user group. +
+
polynomials over Galois Field but in any range with the infinite period of repetition and in any functional environment. +
+
+
THE ADVANTAGES OF RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Comparative characteristics
ALGORITHMS
RMZ PGP RSA AES (RIJNDAEL) GOST 28147-89 BLOWFISH
Patent.
Not patented. Patent is not found. USA patent N 4405829. Not patented Not patented Not patented
Country.
Restricted data. USA. USA. USA. USSR/Russia. USA. Cryptographic standard. Restricted data. Unknown. Unknown. Federal USA standard of encryption since 2001. USSR State Standard of encryption since 1989. Russian State standard of encryption since 1990. Federal USA standard of encryption since 2000. Encrypting system types. Closed. Open. Open. Open. Open. Open. Degree of security. А1. C. C. C. C. C. Encryption algorithm.
algorithm:
algorithm: Algorithm with universal key – multiuser mode. Asymmetric algorithm. Asymmetric algorithm. Symmetric stream block algorithm. Symmetric stream block composite algorithm. Symmetric stream block composite algorithm.
THE ADVANTAGES OF THE CHARACTERISTICS OF RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Comparative characteristics
ALGORITHMS
RMZ PGP RSA AES (RIJNDAEL) GOST 28147-89 BLOWFISH
Architecture. N-dimensional self-organizing probablistic determinate structures. AES + RSA. Square. Based on one known irreducible polynomial of Galois. Classical homogeneous balanced Feistel network. Balanced Feistel network. Encryption speed. Program performance: 1-10 Mbit/s and more depending
Hardware and software performance: 100-500 Mbit/s. It’s small if the key is long. It’s small if the key is long. ( In program performance: ≤40 kbit/s with the module lenth 512 bit). 10 Mbit/s and more. 10 Mbit/s and more. 10 Mbit/s and more. Decryption speed. Program performance: 1-10 Mbit/s and more depending
Hardware and software performance: 100-500 Mbit/s. It’s small if the key is long. It’s small if the key is long. 10 Mbit/s and more. 10 Mbit/s and more. 10 Mbit/s and more. Length of key. 1 024 byte, 2 048 byte, 4 096 byte, 8 192 byte, 16 384 byte and more*. * Key can have any size !!! Up to 256 bit (for symmetric algorithms). Up to 4096 bit (for the algorithms with an open key). 768 bit, 1024 bit, 2048 bit. Up to 4096 bit. 128 bit, 192 bit, 256 bit. 256 bit. 32-448 bit.
THE ADVANTAGES OF THE CHARACTERISTICS OF RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Comparative characteristics
ALGORITHMS RMZ
PGP RSA AES (RIJNDAEL) GOST 28147-89 BLOWFISH
Quantity
105 000 Independent keys! It’s limited by the choice of a simple number. It’s limited by the choice of a simple number. 1080 1080 1010 - 1040 Time of key generation. Real time mode. Minutes. Minutes. 30 kilobit/s with 512 bit key on the processor 2 GHz Real time mode. Real time mode. Real time mode. Block size. 256 byte, 512 byte, 1 kbyte, 2 kbyte, 4 kbyte, … , 128 kbyte and more*. * Block can have any size! Is not limited. Is not limited. 128 bit, 192 bit, 256 bit. 64 bit. 64 bit. Number of rounds. 1, 2, 3. 1. 1. 10, 12, 14. 32. 16.
THE ADVANTAGES OF THE CHARACTERISTICS OF RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Comparative characteristics
ALGORITHMS
RMZ PGP RSA AES (RIJNDAEL) GOST 28147-89 BLOWFISH
Functions of encryption rounds. Binary additive stream ciphering. Bit-to-bit scrambling on the whole lenth of the file by the variable random equidistributed multibytes key. Non-linear operation of replacement with random equidistributed multibytes key for the block with size 256 bytes and more and other complex
Byte stuffing. Byte-to-byte cycle shift in matrix rows. Matrix multiplication. Exponentiation. Exponentiation. Byte stuffing. Byte-to-byte cycle shift in matrix rows. Matrix multiplication. Modular addition 232. Permutation. Ring sum. Cycle shift. Modular addition 232. Permutation. Ring sum.
Cryptostrength. When deciphering by the network of supercomputers (1 petaflops) and a quantum computer.
Decryption is not possible in real-time mode: 107 years and more*. *When the length
4096 byte. Decryption in real time mode: 0,5÷1 microsecond* *When the length
1024-4096 bit. Decryption in real time mode: 0,5÷1 microsecond* *When the length
1024-4096 bit. Decryption in real time mode: 0,5÷1 microsecond* *When the length of the key: 256 bit. Decryption in real time mode: 0,5÷1 microsecond* *When the length of the key: 256 bit. Decryption in real time mode: 0,5÷1 microsecond* *When the length of the key: 448 bit.
THE ADVANTAGES OF THE CHARACTERISTICS OF RMZ
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Disadvantages are not identified! Exposures are not identified! The RMZ cryptosystem hasn’t still been hacked by a supercomputer! The RMZ cryptosystem hasn’t still been hacked by a quantum computer! Time of cracking of RMZ by a supercomputer with a speed of 1 petaflop and the quantum computer is: 107 YEARS AND MORE.
EXPOSURES AND DISADVANTAGES OF THE RMZ ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Repeated checks on the super computer in the leading companies of the world and at the state level of the leading countries (even on a open text) have shown unapproachable cryptostrength of the RMZ. The RMZ surpasses protection of national safety of the USA of level А1. The RMZ system is the latest word in data security which can not be decrypted at any level of science and technology development (according to Shannon's theorem). To create a supersystem of protection like RMZ is very difficult and very expensive (ten billions dollars and ten years of work of huge collectives of scientists). It is necessary to solve the most complicated mathematical, algorithmic and program problems, which are already solved in RMZ. The RMZ cryptosystem is the flagship of cryptosystems in the 21st century and has the world's highest level of cryptographic protection of information.
EXPOSURES AND DISADVANTAGES OF THE RMZ ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
RSA with a length of key of 4096 bits is easily hacked in real time using a supercomputer with a speed of 1 petaflop and a quantum computer in time: 0,5÷1 microsecond. Drawbacks of the skew algorithm RSA:
Due to the difficulty of realization of operations of module arithmetic, cryptoalgorithm RSA is frequently used only for encryption of small volumes of information, for example, for the distribution of secret keys or in the algorithms of digital signature, and the main part of distributed information is encrypted with the help of symmetric algorithms.
EXPOSURES AND DISADVANTAGES OF THE RSA ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Among the most well-known drawbacks of the RSA algorithms we can outline incorrect choice of values of p and q. Figures p should be prime and to not be contained in any of known tables of prime numbers. These figures also should not be close to each other. . There are several ways to crack RSA:
public key.
mod n. Method of crack is a factorization of large prime numbers which is easy to handle for supercomputers and quantum computers in real time.
EXPOSURES AND DISADVANTAGES OF THE RSA ALGORITHM
Another important problem of the RSA algorithm is the generation of large prime numbers, because using RSA cryptographic composite number is falling.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
The report «Efficient padding oracle attacks on cryptographic hardware»: RSA SecurID hacked in 13 minutes.
EXPOSURES AND DISADVANTAGES OF THE RSA ALGORITHM
In 2010 a group of scientists from Switzerland, Japan, France, Netherlands and USA managed to calculate data encrypted via cryptographic key of the RSA standard with the length of 768 bit. Finding out of prime factors was carried out by the general methods of number field sieve.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Disadvantages of the algorithm of the RSA digital signature:
signature it is necessary to check a large number of additional conditions. It is difficult to do it. Non-performance of any of these conditions does possible falsification of the digital signature from the one who will find such non-
costs, exceeding on 20...30% computing costs of other algorithms of the digital signature with the same level of cryptographic security are required.
the algorithm of the RSA digital signature allows the cracker to create (without knowledge of the secret key D) signatures under those documents which result
documents.
EXPOSURES AND DISADVANTAGES OF THE RSA ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
PGP with a length of key of 4096 bits is easily hacked in real time using a supercomputer with a speed of 1 petaflop and a quantum computer in time: 0,5÷1 microsecond. Drawbacks of skew algorithm of PGP:
EXPOSURES AND DISADVANTAGES OF THE PGP ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
AES with a length of key of 256 bits is easily hacked in real time using a supercomputer with a speed of 1 petaflop and the quantum computer in time: 0,5÷1 microsecond. It would be possible to refer use of irreducible polynomial over the Galois field to the advantage of the AES system. As for a supercomputer and a quantum computer this advantage comes to naught because polynomial it is general known. Drawbacks of symmetric key of AES:
EXPOSURES AND DISADVANTAGES OF THE AES ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
The drawback of symmetric encryption is the necessity of transferring the keys «from hand to hand». This drawback is rather serious because it makes impossible to use symmetric encryption in the systems with unlimited number of members. Fragility of AES to side-channel attacks. Many examples of the successful cracking of a full-round AES algorithm with the attacks on the execution time, with power consumption attacks, attacks on the basis of failures. NIST experts admitted that their choice of algorithm Rijndael as AES was wrong.
EXPOSURES AND DISADVANTAGES OF THE AES ALGORITHM
AES cannot be used to confirm authorship, because the key is known for each party.
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Disadvantages of AES:
the number of keys’ couples that should be generated, transmitted, stored and destroyed in the network.
transfer of each key to both parties.
EXPOSURES AND DISADVANTAGES OF THE AES ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
BlowFish with a length of key of 448 bits is easily hacked in real time using a supercomputer with a speed of 1 petaflop and a quantum computer in time: 0,5÷1 microsecond. Drawbacks of symmetric key BlowFish:
The drawback of symmetric encryption is the necessity of transferring the keys «from hand to hand». This drawback is rather serious because it makes impossible the use of symmetric encryption in the systems with unlimited number of members. .
EXPOSURES AND DISADVANTAGES OF THE BLOWFISH ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
The BlowFish researches showed that for this BlowFish algorithm there are weak keys (S-blocks in which there are identical words). When using such keys differential cryptoanalysis allows to restore the massif of subkeys for 8 cycles by means of 223 chosen clear texts, and for 16 cycles - by means of 3·251 chosen clear texts. If weak keys aren't used, for 8 cycles it is possible to restore the massif of subkeys by means of 248 chosen clear texts. The BlowFish system is unsuitable for use in systems where the key often changes, and small volume of data is ciphered on each key. Serious requirements to memory don't allow to use the BlowFish algorithm in smart cards.
EXPOSURES AND DISADVANTAGES OF THE BLOWFISH ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
John Kelsey developed attack which allowed to crack the 3-iterative BlowFish. This attack leans on the fact that addition operators of the module 232 and XOR aren't commutative. It is impossible to use BlowFish for authorship confirmation as the key is known to each party. BlowFish has slow installation of a key. Complexity of control of BlowFish keys in a large network means the quadratic increase of number of keys couples which should be generated, transferred, stored and destroyed in a network.
EXPOSURES AND DISADVANTAGES OF THE BLOWFISH ALGORITHM
Complexity of key exchange. For application it is necessary to solve the problem
transfer of each key to both parties
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Impossibility of key expansion parallel to enciphering process. The small size of the block of ciphered data.
EXPOSURES AND DISADVANTAGES OF THE BLOWFISH ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Drawbacks of symmetric key GOST28147-89:
GOST 28147-89 with a length of key of 256 bits is easily hacked in real time using a supercomputer with a speed of 1 petaflop and a quantum computer in time: 0,5÷1 microsecond. The drawback of GOST28147-89 is the necessity of transferring the keys «from hand to hand». This drawback is rather serious because it makes impossible the use of symmetric encryption in the systems with unlimited number of members.
EXPOSURES AND DISADVANTAGES OF THE GOST28147-89 ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
It is considered that GOST28147-89 has «weak» keys and substitution tables. The drawback of GOST28147-89 is a weak key data. Obviously, zero key and trivial table of substitutes according to which any value is replaced with itself are
the second element value. Program realization is very difficult and almost does not have any sense due to the low performance. It is impossible to use GOST28147-89 for authorship confirmation as the key is known to each party.
EXPOSURES AND DISADVANTAGES OF THE GOST28147-89 ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
Complexity of control of keys in a large network: the quadratic increase of number
network. Complexity of key exchange. For application it is necessary to solve the problem
transfer of each key to both parties.
EXPOSURES AND DISADVANTAGES OF THE GOST28147-89 ALGORITHM
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!
FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!