THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY! FOR THE FIRST TIME - - PowerPoint PPT Presentation

the cryptographic system with absolute stability for the
SMART_READER_LITE
LIVE PREVIEW

THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY! FOR THE FIRST TIME - - PowerPoint PPT Presentation

THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY! FOR THE FIRST TIME IN THE WORLD! info@lesantint.com THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY! RMZ ENCIPHERING SYSTEM FOR THE FIRST TIME IN THE WORLD! RMZ IS THE FIRST IN THE WORLD A1


slide-1
SLIDE 1

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

info@lesantint.com

slide-2
SLIDE 2

RMZ IS THE FIRST IN THE WORLD A1 LEVEL CRYPTOGRAPHIC PROTECTION SYSTEM WITH ABSOLUTE STABILITY. RMZ ENCIPHERING SYSTEM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-3
SLIDE 3

«А1» level is the highest protection level in the world which ensures national and military safety of the countries. Cryptographic system with absolute stability is a system which can be deciphered never and by nobody at any level of science and technology

  • development. It is impossible to crack a cipher even by the attack of

supercomputers and quantum computers. CLAUDE SHANNON RMZ ENCIPHERING SYSTEM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-4
SLIDE 4

 «A1» LEVEL OF PROTECTION!  CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!  QUANTITY OF KEYS: 10 5 000 !  ANY LENGTH OF THE KEY!  ANY SIZE OF THE CIPHERED BLOCK !  TRUE RANDOM NUMBER GENERATOR!  THE MULTIUSER MODE WITH UNLIMITED NUMBER OF USERS!  REAL TIME MODE!  SOFTWARE OR MICROCHIP!  «FRIEND-OR-FOE» MODE!  DIGITAL SIGNATURE!  AUTHENTICATION!  PROTECTION OF THE DIGITAL MOBILE COMMUNICATION!  PROTECTION AGAINST EMULATION AND PENETRATION INTO A NETWORK!  CIPHERING OF ALL TYPES OF FILES !  PROTECTION OF BANK CARDS !  ELECTRONIC MONEY, ETC…

CAPABILITIES OF THE RMZ SYSTEM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-5
SLIDE 5

You can make request on:

  • 1. Demonstration of the RMZ system operation!
  • 2. RMZ files to check for hacking on

supercomputers and quantum computers!

  • 3. Passport of the RMZ cryptographic system!

RMZ ENCIPHERING SYSTEM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-6
SLIDE 6

In 1918 Gilbert Vernam and Joseph Mauborgne theoretically developed the first top secret mode of information transmission which was called the Vernam chiper. Gilbert Standford Vernam (1890-1960, the USA) is an american telecommunication engineer, the employee of the Bell Laboratories. He is best known for the fact that in 1917 working in the field of cryptography he invented the improved polyalphabetic stream cipher and introduced the successful innovation (a pad) with one-time keys using the so-called Vernam chiper for which absolute cryptographic secure is proved.

RMZ IS THE ONLY CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-7
SLIDE 7

However, (before the RMZ system) no one could implement absolutely secure system in practice, because serious difficulties were faced. Some of these difficulties are the creation and transfer of the large secret key needed each time to transfer new

  • information. It would be possible to avoid this difficulty having the confidential

communication channel which privacy would be assured by principles of physics. For the first time in the world the solution of the task on creation of absolutely secure cryptographic system of information protection without existence of a confidential communication channel was realized in the RMZ system: «each user generates byte/multibyte absolutely random, evenly distributed, ever-changing, superlong key (more than the file length) which is used only once and is not transmitted on communication channels». In 1949 Claude Shannon proved the theorem that the cryptosystem is ABSOLUTELY secret if the secret key:

  • is truly random,
  • key length is not less than the length of the encrypted message,
  • this key is used for the transmission of information only once.

RMZ IS THE ONLY ABSOLUTELY SECURE CRYPTOGRAPHIC SYSTEM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-8
SLIDE 8

THE CRYPTOGRAPHIC SYSTEM IS ABSOLUTELY STABLE IF: 1.The key is truly random. 2.The key length is not less than the encrypted message. 3.This key is used only once. CLAUDE SHENNON.

RMZ SYSTEM FULLY MEETS THESE REQUIREMENTS!

The RMZ generator generates truly random keys! See the RMZ generator description below! The RMZ technology allows to create keys of any length! I.e. the key length not less than encrypted message! Quantity of independent random keys in the RMZ is 105 000! Such quantity of keys allows to use each key only once!

ABSOLUTE STABILITY OF THE CRYPTOGRAPHIC SYSTEM RMZ!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-9
SLIDE 9

STABILITY OF SYMMETRIC CRYPTOSYSTEMS TO CRYPTOANALYSIS ACCORDING TO THE C. SHANNON’S THEORETICAL - INFORMATION APPROACH

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-10
SLIDE 10

STABILITY OF SYMMETRIC CRYPTOSYSTEMS TO CRYPTOANALYSIS ACCORDING TO THE C. SHANNON’S THEORETICAL - INFORMATION APPROACH

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-11
SLIDE 11

STABILITY OF SYMMETRIC CRYPTOSYSTEMS TO CRYPTOANALYSIS ACCORDING TO THE C. SHANNON’S THEORETICAL - INFORMATION APPROACH

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-12
SLIDE 12

IDEALLY STABILITY CIPHER it is a cipher if it is impossible to define unambiguously a open text at a known ciphertext of arbitrarily large length (the completely stability cipher becomes the ideally stability cipher). ABSOLUTELY STABILITY CIPHER it is the cipher if the key is a fragment

  • f a random binary sequence with the uniform law of distribution, length of a key is

equal to length of the original message and this key is used only once and then this key is destroyed (it is impossible to hack the cipher even if the cryptanalyst has unlimited resources of time and unlimited set of computing resources). Thus a necessary and sufficient condition of absolute stability cipher is:

  • full randomness of a key;
  • equality of the key length and the length of the open text;
  • one-time use of the key.

THE RMZ CRYPTOSYSTEM NOT ONLY MEETS THESE REQUIREMENTS BUT ALSO REPEATEDLY SURPASSES THEM! STABILITY OF SYMMETRIC CRYPTOSYSTEMS TO CRYPTOANALYSIS ACCORDING TO THE C. SHANNON’S THEORETICAL - INFORMATION APPROACH

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-13
SLIDE 13
  • C. Shannon theoretically showed the existence of a cryptosystem which has

completely security, i.e. the existence of cryptosystems in which the cipher does not give any information about the open message (except its length). This is possible only if the number of possible keys is also large as the number of possible messages. QUANTITY OF THE INDEPENDENT ABSOLUTELY RANDOM KEYS IN THE RMZ SYSTEM: 10 5 000 The RMZ cryptosystem for the first time in the world showed the practical implementation of cryptosystem with the absolute stability that is a scientific break in the cryptography! Realization of the absolute stability of the RMZ cryptosystem is a merit of the developed new mathematical apparatus! This mathematical apparatus for the first time in the world completely simulates the condition, structure and functioning of the physical vacuum. This development is a closed scientific achievement which will not be published in the coming years. STABILITY OF SYMMETRIC CRYPTOSYSTEMS TO CRYPTOANALYSIS ACCORDING TO THE C. SHANNON’S THEORETICAL - INFORMATION APPROACH

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-14
SLIDE 14

RMZ EXCEEDS ALL EXISTING CRYPTOGRAGHIC SYSTEMS IN THE WORLD

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-15
SLIDE 15

RMZ EXCEEDS THE NATIONAL SECURITY OF THE USA: 1) 109 times in time of penetration into a network; 2) 1010 times in time of deciphering.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-16
SLIDE 16

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

A1 LEVEL OF THE USA NATIONAL SECURITY PGP, RSA, GOST28147-89, AES, BLOWFISH, ETC. ANTI-VIRUS SYSTEMS, ETC.

109 ÷ 1010

RMZ IS THE FLAGMAN OF THE PROTECTION SYSTEMS!

slide-17
SLIDE 17

Statistically, because of imperfection of modern security systems of data annual losses in the world (connected with data stealing, hacking, malicious viruses effect and so on) make up 1.2% - 2% of the world GDP that will constitute in money equivalent:

( $600 billions - $1 trillion ) / year

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-18
SLIDE 18

Edward Snouden's statements confirm that currently the best encryption algorithms lost the cryptographic security. There is a set of special programs (PRISM(USA), TEMPORA(UK), etc.) which freely supervise all flow of information in the world thanks to application of supercomputers and quantum computers. According to the statement of intelligence agencies, the PRISM, TEMPORA programs are destined to fight against crime, terrorism, etc. But the danger of such systems as PRISM, TEMPORA and similar is that intelligence agencies have been using these programs for a long time for:

  • political espionage,
  • control of all bank information (accounts, transactions, data of clients, etc.),
  • thefts of scientific research results before their patenting,
  • total control of the population in the world,
  • industrial espionage, etc.

THE WHOLE WORLD IS UNDER CONTROL

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-19
SLIDE 19

«TIANHE-2». China. 33,86 petaflop. «GRAY TITAN». USA. 17,6 petaflop. «SEQUOIA». USA. 17,2 petaflop. SUPERCOMPUTERS OF THE WORLD

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-20
SLIDE 20

«K». Japan. 10,51 petaflop. «MIRA». USA. 8,6 petaflop. «STAMPEDE». USA. 5,2 petaflop. SUPERCOMPUTERS OF THE WORLD

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-21
SLIDE 21

«JUQUEEN». Germany. 5 petaflop. «VULCAN». USA. 4.3 petaflop. YOU CAN CHECK OUT OTHER MODELS IN TOP-500 LIST OF SUPERCOMPUTERS OF THE WORLD. SUPERCOMPUTERS OF THE WORLD

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-22
SLIDE 22

The exponential computing speed increase of a quantum computer on the number of qubit in its processor really alarmed the "secret" world community. Google, NASA, Lockheed Martin are beginning to use a quantum computers. The Google engineers are going to create a new quantum algorithms of high-efficiency search system. The American Space agency and the Google company have joined the growing list of clients of the Canadian company D-Wave which will soon start using the latest D-Wave Two model of a quantum supercomputer.

QUANTUM COMPUTERS

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

D-Wave. http://www.dwavesys.com Canada. «Two». 512 quantum bits.

slide-23
SLIDE 23

A quantum computer with 300 quantum bits processor performs simultaneously 2∙1030

  • perations.

For comparison, if we take each atom in the known Universe and turn it into a bit of classical supercomputer then all the atoms will not be enough to reach the computing power of a 300-qubits quantum computer. So, a new quantum computer with 300 quantum bits processor can get ahead of a supercomputer the size of the Universe (diameter of the quantum processor is less than 1 mm). During the demonstration the quantum computer D-Wave completed over capacious Ramsey task only within 270 milliseconds!!! A quantum computer can factor the number consisting of N number position in N2

  • perations. This means that powerful quantum computers make all cryptographic algorithms

(PGP, RSA, etc.) unusable.

QUANTUM COMPUTERS

As none of the cryptosystems (except RMZ) is difficult for supercomputers and quantum computers, then all the existing systems of password access, data authentication, encrypting systems and also systems of banking transactions completely lose their meaning and require a drastic modification.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-24
SLIDE 24

A NEW ERA OF SUPERCOMPUTERS AND QUANTUM COMPUTERS

A new era of supercomputing and quantum computers began! All the best encryption system (PGP, GOST28147-89, RSA, AES, DES, etc) and even those encryption system which provide the national security of the countries have lost their cryptographic strength! Only the cryptosystem with absolute stability can resist against supercomputers and quantum computers! The RMZ cryptosystem is the only cryptosystem in the world with absolute stability!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-25
SLIDE 25

Hacking time of the RMZ with the length of the key 256 bytes using a supercomputer (1 petaflop) and a quantum computer is:

107 YEARS.

You can download the RMZ files yourselves and test them on the hack! Hacking time of the top cryptosystems (PGP, RSA, AES, GOST 28147-89, BlowFish, DES, etc.) with the maximum length of the key using a supercomputer (1 petaflop) and a quantum computer is:

0.5 ÷ 1 MIKROSECOND.

* for each cryptographic algorithm (except RMZ) is the own mathematical methods of the accelerated hacking with the use

  • f supercomputers and quantum computers! The method of

hacking by direct search (“forehead”) is already irrelevant!

HACKING DURATION OF CRYPTOGRAPHIC SYSTEMS

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-26
SLIDE 26

Hackers have made havoc in the Pentagon, when they had reached the largest secret nuclear program of the American Defence Department. The hackers have stollen the data about new multi-mission fifth-generation «Joint Strike» fighter which is able to carry nuclear weapons. The project on its creation costs 300 billion dollars. The cost of

  • ne fighter is more than 150 million dollars. The Pentagon

has already started to count the losses. A group of hackers has broken into the computer system of CERN (European Nuclear Research Center). This is an organization that manages Large Hadron Collider project (LHC) according to the Daily Telegraph. The CERN scientists were worried by this cyber-attack because the hackers were really close to the computer system contolling

  • CMS. Sources of publication have reported that if hackers

had broken the computer system of the second level they would have been able to deactivate CMS partially.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-27
SLIDE 27

Hackers have stolen space secrets of the Pentagon. The Pentagon brass admitted that they had been attacked by hackers who had committed the largest data theft in the world. The databases of such companies as Amazon, Citigroup and Barclaycard were stolen by unknown hackers. The mail server of the Epsilon company was attacked by hackers. The company is engaged in the internet-market researching (the Daily Telegraph reports). One of the largest financial groups in the world Citigroup Inc reported that hackers had broken one of its corporate networks and got access to personal data of hundred thousands of bank card owners (the Financial Times reports).

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-28
SLIDE 28

The computer network of unmanned aerial vehicles of the US Air Forces controlling the operation of Predator and Riper unmanned air vehicles abroad and in Irag and Afghanistan in particular, was damaged by a virus as the American Wired Magazine reports. Predator and Riper unmanned air vehicles are armed with rockets and bombs and ground-controlled by the satellites but they can be manned autonomy.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-29
SLIDE 29

On December 8, 2011 Iranian military managed to seize control over American remote piloted spy RQ170 Sentinel, and then to land it safely on one of their aerodromes. RQ170 Sentinel is the recent development of one of the divisions of Lockheed Martin company. The USA has already started to count the losses due to lost technologies that will be known to other countries. George W. Bush: «Terrorists have an opportunity to listen to almost any of our phone calls…».

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-30
SLIDE 30

In early January 2012 the Group-XP hackers’ group from Saudi Arabia made a cyber-attack on Israel. As a result of this attack stolen data of 400 000 clients

  • f Israel banks were revealed (these are card numbers, pin-

codes, personal data of bank card owners and etc.) on the cracked Israel site one.co.il. Banks blocked the operations from all customers’ credit cards and promised to compensate for financial losses in case of the theft of funds. Banks operation on card accounts is blocked. Experts say that this is the largest theft of data in the country.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-31
SLIDE 31

Hackers have broken open the site of the US Department of Justice. The responsibility for attack was claimed by the hacker grouping Anonymous. Hackers have got access to the data on all crimes committed within the USA including computer sphere, 1,7 Gb in total. Thus through social network Twitter representatives

  • f the grouping informed that they had copied this

information and posted it for the public access. Earlier Anonymous had already made attacks on sites

  • f such companies as Visa and MasterСard, Sony,

Nintendo, the site of the US Senate and also the governmental resources of Brazil, Mexico, Italy.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-32
SLIDE 32

PRISM is a system of total surveillance of United States which allows you to collect and store giant digital data streams around the world. PRISM system has powerful stations and data centers to decrypt all the data. PRISM system makes monitoring

  • f

e-mail communication, phone calls, sms, video chats, web sites, skype, financial transactions, etc. The RMZ system is the only system of information security in the world which cannot be decrypted by PRISM system!!!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-33
SLIDE 33

Using the services of these companies you are under control of the «PRISM» system!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-34
SLIDE 34

The Tempora system of Great Britain is an analog of PRISM system of the USA. The Tempora system also exercises total control over information in the world. 20 petabytes of information adjudged in the "network" Tempora every day. For an example, all archive of the Internet for October 25, 2012 contains about the 10th petabyte of data. GCHQ skips through Tempora 600 000 000 "telephone facts" and at the same time "monitors" the information from the 200 FO cables. Including, the British GCHQ intercepts information from 46 transatlantic cables.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-35
SLIDE 35

According to the Wall Street Journal the largest hacking scam in the U.S. history is: a group of four Russian and one Ukrainian hackers cracked the internal network of the American Stock Exchange NASDAQ and several large companies, including Citibank and 7-Eleven. During seven years (since 2005!) they had been downloading the data of more than 160 million credit cards and caused losses of more than $ 300 million. July 25, 2013.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-36
SLIDE 36

According to Edward J. Snowden’s documents, the National Security Agency of USA (NSA) is engaged in the cracking of the most popular encryption methods and infiltration of brittleness into popular internet services. The Secret Intelligence Service of Britain is helping NSA to spy within the framework of the program. James R. Clapper (the head of NSA) intends to bypass all known encryption techniques! In the framework of the program codenamed Bullrun NSA is handling cryptanalysis and applying its results practically. NSA is cooperating with engineering companies to create its own network access point into their products.

James R. Clapper, the head of NSA.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-37
SLIDE 37

NSA finds its deciphering ability vital to compete with Russia, China and other countries. “In future supercountries will be broken or created, basing only on power of their cryptoanalytical programs (the 2007 year document says). This is the admission price

  • f USA into the cyberspace with unlimited access.”

“We are investing in the innovating cryptanalytical capabilities to win a contest with cryptography and use an Internet traffic for own purposes” (James R. Clapper wrote in his budget call for the present year).

James R. Clapper, the head of NSA.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-38
SLIDE 38

NSA also spends more than 250 million dollars annually for the «Sigint Enabling Project» which “is extensively involving home and foreign companies to secretly effect and/or publicly use their commercial products as operating units”. Sigint has an acronym from “signals intelligence” in the name of the project, i.e. electronic intelligence. In the framework of this project NSA is planning to get a full access to an unnamed significant service of internet calls and sending messages, a certain internet service in the Middle East and communications of three foreign governments.

James R. Clapper, the head of NSA.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-39
SLIDE 39

the private data (trade secrets and medical records), emails, inquiries in Search Engines, internet chatting and phone calls of American people and other people all over the world. According to another documents turned over by Edward J. Snowden to the journalists of The Guardian and The New York Times the National Security Agency of USA evaded the protection and cracked the encryption methods used in the world trading and banking system and protecting

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-40
SLIDE 40

USA was spying the whole Latin America, Germany, China, Iraq. NSA has an opportunity to bug phone calls of the countries’ presidents and all the leadership. American secret service was bugging 38 embassies and legations

  • f different countries in New York

and Washington. NSA listened to European Union representation in Washington, headquarters of the UN and EU Council in Brussels..

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-41
SLIDE 41

NSA is able to get an access to the data of any smart phone regardless of its operating system (iOs, Android, BlackBerry, etc.). The German magazine Spiegel wrote about this making reference to the documents of NSA. As a result NSA gets an access to the contact lists, text messages, data of tablets; NSA can fix the position

  • f a smart phone’s owner.

American court officially allowed to American secret service to continue collection of the data about phone calls.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-42
SLIDE 42

All these information talk about the deplorable state of the existent systems of defence of leading countries of the world, none of their systems of defence is able to resist kiber war. RMZ CRYPTOGRAPHIC SYSTEM is the unique in the world protection system which can stop any cyber attack. If all users get an access to supercomputers, quantum computers now then protection systems of banks, companies, military facilities, national security of all countries of the world will fall at once. Therefore, in today's world we have a situation in which the current protection systems of the leading countries of the world (even military and national security) are extremely fragile and are behind the current level of technology and science development that represents huge real and potential threat. Failure or hacking of military protection could lead to nuclear war and the destruction of the world. There are already precedents of access attempts from outside to the strategic arms of the leading countries of the world.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-43
SLIDE 43

PRISM (USA) GCHQ (UK) TEMPORA HACKERS MALICIOUS SOFTWARE

ABSOLUTE PROTECTION OF THE RMZ SYSTEM

NSA (USA)

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

QUANTUM COMPUTERS, SUPERCOMPUTERS

slide-44
SLIDE 44

A - key length B - quantity of keys C - quantity of algorithms D - quantity of the users E - protection of station F - quantity of the passwords in multi-user mode

1

RMZ Systems of protection of national security of the world leading countries AES PGP A B C D E F

RMZ

COMPARISON OF DIFFERENT PROTECTION SYSTEMS

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-45
SLIDE 45

T RMZ

109 108 107 106 105 104

. . .

10 RMZ Systems of protection of national security of the world leading countries AES PGP

RMZ is 109 times better than the A1 Level of the USA National Security! (penetration into a network)

T – time of penetration in a

network

2

COMPARISON OF DIFFERENT PROTECTIVE SYSTEMS (PROTECTION AGAINST PENETRATION INTO A NETWORK)

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-46
SLIDE 46

T

RMZ Systems of protection of national security of the world leading countries AES PGP

1010 109 108 107 106 105 104

. . .

COMPARISON OF DIFFERENT PROTECTION SYSTEMS (PROTECTION AGAINST DECIPHERING) RMZ is 1010 times better than the A1 Level of the USA National Security! (protection against deciphering)

3

T – time of deciphering

RMZ

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-47
SLIDE 47
  • Time of hacking in relative units.
  • The level of protection of RMZ.
  • The level of protection of the best operational banking systems.

K

1020 1019 1018 1017 1016 1015

. . .

RMZ

PROTECTION OF THE BANKING INFORMATION, NETWORKS, PLASTIC CREDIT CARDS.

The RMZ system is 1020 times better than the best bank protection systems!

4

K

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-48
SLIDE 48

RMZ IS UNIQUE IN THE WORLD CRYPTOGRAPHIC SYSTEM WHICH PROVIDES ABSOLUTE PROTECTION OF MULTIUSER NETWORK WITH UNLIMITED NUMBER OF USERS IN REAL TIME.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-49
SLIDE 49

RMZ IS THE ONLY SYSTEM IN THE WORLD THAT PROVIDES PROTECTION FOR DIGITAL PHONE NETWORKS AND TELECOMMUNICATION SYSTEMS FROM OVERHEARING AND EMULATION.

All other ciphering systems ( RSA, GOST, etc.) do not make sense in cryptosmartphones: They are easily deciphered by the national security environment in real-time mode! They have big troubles in sound transmission! They mutilate voice, etc.!

DURING THE OPERATION OF THE RMZ SYSTEM IN THE TELEPHONE:  Authentification of a handset and user! The keys are not transferred! The initial data is not transferred! There are no troubles during the transmission of sound!  There is no voice mutilation!  Great operation speed (real-time mode) ! Deciphering by the national security environment is impossible! Emulation is not possible!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-50
SLIDE 50

RMZ PROTECTS YOUR BUSINESS FROM UNAUTHORIZED ACCESS FROM OUTSIDE

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-51
SLIDE 51

RMZ PROTECTS DATABASES IN THE MULTIUSER MODES

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-52
SLIDE 52

THE RMZ SYSTEM IS CAPABLE TO PROTECT BANK CARDS DUE TO:

  • Support of multiuser mode with an

unlimited number of users,

  • High-speed of RMZ in microchip,
  • RMZ small-sized software, etc.

RMZ SUPPORTS PROTECTION OF THE BANK CARDS

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-53
SLIDE 53

RMZ microchips can be integrated into any bank equipment: modem, server, hard drive, usb-drive, network card, phone, smart banking cards, ATM, satellite, cryptophone, etc. MICROCHIP RMZ

INTEGRATION OF THE RMZ INTO THE BANK EQUIPMENT

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-54
SLIDE 54

CIPHER RMZ Banking smart card with the RMZ chip ATM Computer Server ATM Server

PROTECTION OF THE BANKING SYSTEMS AT ALL LEVELS!

CIPHER RMZ CIPHER RMZ

INTEGRATION OF THE RMZ INTO THE BANK EQUIPMENT

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-55
SLIDE 55

REMOTE INTERNET CLIENT SERVICE PROTECT DATA FROM INTERNAL EMPLOYEES OF THE BANK

THE RMZ SYSTEM SOLVES BOTH OF THESE PROBLEMS ! ! !

«In fact payments which pass through the Internet bank aren't protected, if desired it is possible to take away money from the accounts from 99 % of users», – declared, speaking at the XI International forum of iFin « Electronic Financial Services and Technologies in Russia », the director general Websafer.ru Vladimir Vorochenko. A study conducted by Sailpoint Technologies in the USA, UK and Australia showed that of the 3,500 employees surveyed (insiders in fact) a sufficiently large number are able and willing to steal sensitive information from their companies for personal gain: 22% in the U.S. 29% in Australia and about half of the respondents in the UK.

TWO MAJOR BANKS’ UNSOLVED PROBLEMS

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-56
SLIDE 56

THESE ATTACKS ARE IMPOSSIBLE IF YOU HAVE AN RMZ MICROCHIP IN YOUR PHONE !!! Intuders can remotely break not only your computer but your mobile telephone as well. According to Karsten Nol (a well-known speacialist on computer security): «We can remotely set up a software into a mobile of the victim and this software will work absolutely regardless of the telephone. We can spy on you. We can get your

MOBILE PHONES’ EXPOSURE IN BANKING OPERATIONS

cryptokeys used for the ciphering of phone calls. We can read your text messages. Except for just spying we can steal very important data about an owner (also with the help of text messages) from a SIM card your mobile personality and withdraw money from your account».

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-57
SLIDE 57

The technology RMZ allows to create a device «MOBILE ONLINE BANK» («MOB»). The «MOB» is a hardware-software complex

  • f tablet type with RMZ microchip.

«MOB» is a specialized independent mobile device with Internet access. «MOB» is a new stage of development of the Internet-Banking. The use of Internet banking on home computers and mobile phones is dangerous, because these devices are not protected from hackers and malicious software. The system «MOB» has none of these disadvantages. The cost of «MOB» makes less than $40 for clients of the bank.

MOBILE ONLINE BANK «MOB»

«MOB» is intended to commit remote bank operations in absolutely protected RMZ system. Absolutely protected Internet Banking is possible only with application

  • f the hardware-software complex «MOB» .

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-58
SLIDE 58

«MOB» supports all networks (Ethernet, Wi-Fi, Blue-tools, etc). «MOB» is the next stage of development of the banking industry.

INTERNET

«MOB» OPERATION WITH A BANK IN THE INTERNET

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-59
SLIDE 59

With the help of «MOB» Internet Banking can perform any operations in the absolutely protected mode (at home, on the road, on rest and so on). «MOB» is your mobile bank in your pocket with 24 hours access from anywhere in the world.

«MOB» USE

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-60
SLIDE 60

USING «MOB» FOR A BANK ALLOWS:

  • To direct all the cash flow from non-teller terminals to the bank.
  • To introduce cashless electronic type of transactions.
  • To maximize bank automation.
  • To cancel queues in banks.
  • To increase a number of bank operations with the customers.
  • To increase work speed with a bank.
  • To increase convenience of work with a bank.
  • To create the world's first totally secure Internet Banking.
  • To make a bank work 24 hours per day without days off in a completely

automatic mode.

  • To increase a competitiveness of a bank.
  • To increase a prestige of a bank and many other things.

«MOB» ADVANTAGES

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-61
SLIDE 61

RMZ IS A UNIVERSAL PROTECTION SYSTEM OF ANY KIND OF INFORMATION

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-62
SLIDE 62

RMZ IS THE ONLY SYSTEM IN THE WORLD WHICH PROVIDES ABSOLUTE PROTECTION FOR MILITARY NETWORK-CENTRIC TECHNOLOGIES «FRIEND-OR-FOE» MODE

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-63
SLIDE 63

RMZ IS THE ONLY SYSTEM IN THE WORLD WHICH PROVIDES ABSOLUTE PROTECTION FOR MILITARY NETWORK-CENTRIC TECHNOLOGIES

Network-centric warfare (or «network-centric military operations», «network-centric operations») is a new military doctrine (or operating concept) which was used for the first time by the United States Department

  • f Defence.

The network-centric concept provides granting to participants of operations of reliable and full information about a situation in real time. Thereby achieved acceleration

  • f management process by forces and means, increase of

rate of operations, efficiency of defeat of forces of the

  • pponent, survivability of the armies and level of self-

synchronization of operations is reached.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-64
SLIDE 64

Network-centric warfare and cyberwarfare are the concepts which became a reality in the XXI century. The U.S. has already «...adapted their armed forces to conduct network-centric warfare», that requires absolute dominance in cyberspace. The robotized aviation wing of the Navies

  • f the USA is beginning to take its shape. It is

a low-observable unmanned aircraft-killer with a jet engine which will be stationed at aircraft carriers and will fly together with managed fighter aircraft.

RMZ IS THE ONLY SYSTEM IN THE WORLD WHICH PROVIDES ABSOLUTE PROTECTION FOR MILITARY NETWORK-CENTRIC TECHNOLOGIES

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-65
SLIDE 65

It should be noted that without the RMZ system safe management of such unmanned aircrafts is impossible! On December 8, 2011 Iran intercepted management over the American prospecting UAV RQ170 Sentinel aircraft and then without prejudice landed him at its airport.. RQ170 Sentinel is the recent development of one

  • f the divisions of Lockheed Martin company.

The USA already started counting damage from the lost technologies of this UAV which become known to other countries.

RMZ IS THE ONLY SYSTEM IN THE WORLD WHICH PROVIDES ABSOLUTE PROTECTION FOR MILITARY NETWORK-CENTRIC TECHNOLOGIES

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-66
SLIDE 66

RMZ PROVIDES THE SAFE MODE OF OPERATION OF UNITS IN THE NETWORK-CENTRIC MILITARY SYSTEM «FRIEND-OR-FOE» MODE

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-67
SLIDE 67

RMZ PROVIDES ABSOLUTELY PROTECTED CONTOROL CHANEL OF STRATEGIC WEAPON. INTERCEPTION OF CONTROL IS IMPOSSIBLE! «FRIEND-OR-FOE» MODE

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-68
SLIDE 68

MANAGEMENT INTERCEPTION OF OVER UAV IS IMPOSSIBLE! ONLY SYSTEMS WITH A1 LEVEL PROTECTION PROVIDE THE «FRIEND-OR-FOE» MODE!

«FRIEND-OR-FOE» MODE OF THE RMZ SYSTEM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-69
SLIDE 69

RMZ PROVIDES PROTECTION OF SATELLITE SYSTEMS AND COMMUNICATION CHANNELS «FRIEND-OR-FOE» MODE

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-70
SLIDE 70

RMZ ADVANTAGES FOR MILITARY COMMUNICATION SYSTEMS

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

1. Identifying of objects in the network-centric system. 2. Absolute protection of the communication system :

  • eavesdropping is impossible,
  • deciphering of a signal is impossible,
  • imitation of the intercepted signal is impossible
  • 3. Highly responsive of the RMZ system - 100÷500 Mbit/sec (microchip).
  • 4. Small-sized and lightweight of the communication devices based on the

RMZ technology : RMZ can operate in real time in an ordinary mobile phone.

  • 5. Authentication of the telephone set and user.

6. Access to the lithographic matrix of the RMZ microchip is impossible (40 nm technology). 7. Unlimited quantity of users in the network.

slide-71
SLIDE 71

RMZ PROVIDES PROTECTION OF RADIO CHANNELS OF COMMUNICATION

100% OF MILITARY NEGOTIATIONS ARE BUGGED BY ENEMY! IT LEADS TO THE HUGE LOSSES IN THE BATTLE!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-72
SLIDE 72

ONLY THE RMZ SYSTEM IS CAPABLE TO PROTECT FROM HACKERS RMZ IS THE №1 PROTECTION SYSTEM IN THE WORLD

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-73
SLIDE 73

HARDWARE - SOFTWARE IMPLEMENT OF THE RMZ SYSTEM (MICROCHIP)

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-74
SLIDE 74

THE RMZ SYSTEM IS ABLE TO PROTECT BIOMETRIC DATA OF A BIOPASSPORT IN THE MICROCHIP!

THE RMZ MICROCHIPS IN BIOPASSPORTS

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-75
SLIDE 75

WHY IS THE RMZ SYSTEM THE BEST CRYPTOSYSTEM IN THE WORLD?

RMZ is a cryptographic system with absolute stability because in RMZ a number of mathematical KNOW-HOWS was solved for the first time in the world. RMZ is a cryptographic system with absolute stability because only the RMZ generator carries out superstrong tests.

1 2

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-76
SLIDE 76
  • 1. «Sieve random numbers».

MATHEMATICAL KNOW-HOWS OF THE RMZ SYSTEM

  • 2. «Generation of the universal key for any group of users».
  • 3. «There is not any dependence between the universal key and initial

data».

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-77
SLIDE 77
  • 4. «Installation of the generator into any point of space up to 105 000».
  • 5. «Generation by using dynamically changing self-organizing structural

functions».

  • 6. «Generation of probabilistically determined structures».

MATHEMATICAL KNOW-HOWS OF THE RMZ SYSTEM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-78
SLIDE 78
  • 7. «In the mathematical apparatus of the RMZ system two most difficult

tasks are solved (two mutually exclusive processes are carried out at the same time):

  • determination;
  • random chaos of sieve random numbers».
  • 8. «The mode of authentication is carried out by the independent

random generated passwords:

  • length of the password is not limited;

(optimal sufficient length of the password is 256 - 28 672 bytes)

  • quantity of passwords: 105 000».

MATHEMATICAL KNOW-HOWS OF THE RMZ SYSTEM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-79
SLIDE 79

TEST NO. 1. «CHECK ON THE FREQUENCIES». TEST NO. 2. «CHARACTER-ORIENTED CHECK». RMZ IS THE ONLY CRYPTOGRAPHIC SYSTEM IN THE WORLD THE GENERATOR OF WHICH PASSES THESE SUPERSTRONG TESTS! These tests are described in the book «Theory, Application and Assessment of Quality of Generators of Pseudorandom Sequences» (the book 2; M.A.Ivanov, I.V.Chugunkov; «KUDITS–OBRAZ» Publisher; Moscow; 2003). SUPERSTRONG TESTS OF THE RMZ GENERATOR

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-80
SLIDE 80

SUPERSTRONG TESTS OF THE RMZ GENERATOR

Z

Only the generator of the cryptographic RMZ system passes this test !!!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-81
SLIDE 81

SUPERSTRONG TESTS OF THE RMZ GENERATOR

Z

Only the generator of the cryptographic RMZ system passes this test !!!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-82
SLIDE 82

The RMZ basis is the generator of random numbers which generates random, equally distributed, byte/multibyte sequences which self-organize above a field of real numbers. The RMZ generator is based on self-organizing, random, open/semiopen N- dimensional sets which can multiply (similarly to the living cells) and which never lose their structure (never degenerate) in the infinite N-dimensional space (similarly to the N-dimensional, embedded, linked, random fractals).

ВПЕРВЫЕ В МИРЕ! АБСОЛЮТНО СТОЙКАЯ КРИПТОСИСТЕМА!

1

THE RMZ GENERATOR

slide-83
SLIDE 83

Self-organizing is a process during which the organization of complex dynamic system is created, reproduced or improved. Processes of self-organizing can take place only in the systems having a high level of complexity and a plenty of elements, communications between which have not rigid but random character. Processes of self-organizing occur due to reorganization of existing and formations of new communications between elements

  • f a system. Distinctive feature of processes of self-organizing is their purposeful but

at the same time natural, spontaneous character (these processes proceeding at the time

  • f interaction of system with an environment, are to some extent independent,

relatively independent from it). The properties of self-organization are present in a wide range of objects of nature: a living cell, organism, a biological population, biogeocoenosis, the human team, etc.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

2

THE RMZ GENERATOR

slide-84
SLIDE 84

Absolute uniformity of random byte/multibyte field allows to implement bit

  • peration of scrambling (rearrangements) which never repeating (keys never repeat)
  • n all bit/byte field of a ciphered file.

At each step of work of the generator new random keys are developed and on the other piece of a file there is a bit-by-bit operation of scrambling. The length of a piece of a file and length of keys is limited by nothing! THIS OPERATION IN SUCH IMPLEMENTATION IS IMPOSSIBLE FOR OTHER ENCIPHERING SYSTEMS !!!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

3

THE RMZ GENERATOR

slide-85
SLIDE 85

Absolute uniformity random byte/multibyte field allows to realize a nonlinear

  • peration of replacement of elements of the block of a ciphered file (stochastic

transformation), byte or bit replacement (the length of the block can reach tens kilobytes). At each step of work of the generator new random keys are developed and the table of replacement is updated . The replacement tables form by random image. Quantity

  • f

replacement tables is equal to the quantity

  • f

keys in the system = 10 5 000. THIS OPERATION IN SUCH IMPLEMENTATION IS IMPOSSIBLE FOR OTHER ENCIPHERING SYSTEMS !!!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

4

THE RMZ GENERATOR

slide-86
SLIDE 86

ABSOLUTELY UNIFORM DISTRIBUTION OF THE NUMBERS IN THE RMZ The result of work

  • f the RMZ generator:
  • 1. F0 and F2 are the absolute

uniformity of numbers from 0 to 255 in the gamma with a length of several Mb.

  • 2. F1 and F3 are the elements of a

small chaos on an uniform sequences.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

5

THE RMZ GENERATOR

slide-87
SLIDE 87

ABSOLUTELY UNIFORM DISTRIBUTION OF THE NUMBERS IN THE RMZ As seen from the graph, only the RMZ cryptosystem has an absolute uniform distribution of keys! Therefore, RMZ is the

  • nly

cryptosystem in the world whose generator performs two super difficult tests: Test №1. «Check on the frequencies». Test №2. «Character-oriented check».

These tests are described in the book «Theory, Application and Assessment of Quality of Generators of Pseudorandom Sequences» (the book 2; M.A.Ivanov, I.V.Chugunkov; «KUDITS–OBRAZ» Publisher; Moscow; 2003).

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

6

THE RMZ GENERATOR

slide-88
SLIDE 88

All other cryptosystem have not the absolute uniform distribution of the numbers as in the RMZ cryptosystem, i.e. on the graphs of distribution of numbers of all other cryptosystems there are surges on which the cryptanalyst can hack the cipher by means of special mathematical methods, super computers, quantum computers!

G Transformat data CIP-DEC INITIAL DATA

Absolutely uniform distribution

  • f

the numbers in the RMZ cryptosystem does not allow to make cryptanalysis by means of the special mathematical methods, supercomputers, quantum computers! It is impossible to hack the RMZ cipher!

RMZ

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

7

THE RMZ GENERATOR

slide-89
SLIDE 89

The RMZ Generator is implemented on the new class of mathematical functions

(probabilistically determined self-organized structures).

The generator allows to develop sequences for other operations of enciphering

either: summation on module N, multiplication on module N and some other (convertible and even irreversible operations; convertible with the help of specially developed keys during deciphering). After enciphering with these operations any data turns to a «bit dust» !!!

The generator is automatically established into any point of the space, the new

file is ciphered by other random never repeating keys. It is not necessary to place the generator deliberately.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

8

THE RMZ GENERATOR

slide-90
SLIDE 90

Each user forms the random initial data (5-50) kb (depending on algorithmic

basis) which is the basis of work of the generator. In case of work with an universal key the provider supplies for each user his initial data which are formed automatically and can be placed within the chip as well as the universal key within the chip . The initial data is never transmitted through the networks and can serve to a user all the years of working with the RMZ.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

9

THE RMZ GENERATOR

slide-91
SLIDE 91

The initial data can be stored even in the ciphered kind without storage of a key of

  • pening (the key of opening of the initial data is very short but it is the reflection to

infinite space and it is impossible to calculate it out by sorting).

Deciphering of the initial data takes place in a body of the program that doesn't

allow to create dump of memory (protection from losses of the initial data). Absolute protection of the initial data and the algorithm of the program against hacking in the RMZ microchip. The generator allows to originate the random numbers similar obtained with the help of irreducible polynomials over Galois Field but in any range with the infinite period of repetition and in any functional environment.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

10

THE RMZ GENERATOR

slide-92
SLIDE 92

The system allows to create random N-dimensional in space byte/multibyte

length key at the output which allows to realize various linear/nonlinear operations of enciphering at all bit field of the file and perform block-by-block or bit-by-bit encryption of any quantity of bits/bytes arriving on an entrance. Keys are formed by users or provider. The initial data can be stored in the ciphered kind in the computer and deciphering goes on the N-dimensional image.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

11

THE RMZ GENERATOR

slide-93
SLIDE 93

Cryptographic strength is also defined by:

  • length of a random key,
  • length of initial data at each user,
  • very high algebraic complexity of random nonlinear structures.

In the process of formation of the keys there is a multifold process of nonlinear display with ruptures of the first and second kind one set into another; the special mathematical operations are realized, this operations are the conversion of N- measured latch hooks into random distributed spaces (all conversions are irreversible).

Nonlinearity of generator and methods of transformation is extremely high: to

change the initial data to one bit (of any byte) is just enough to make deciphering impossible (formation of the random spaces goes the other way (other random keys).

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

12

THE RMZ GENERATOR

slide-94
SLIDE 94

Nonlinearity of the transformation of the data can be brought up to the huge sizes too: during changing of the ciphered data on one bit (of one byte) at the block cipher and deciphering of the block will be impossible.

Unlike many cryptographic systems RMZ is based on the random number

generator that outperforms other generators which based on irreducible polynomials

  • ver the Galois field or on other functions!

The range of the numbers elaborated by the RMZ generator is limited by nothing (0 - 255, 0 - 511, 0 - 1023, etc.), that's why the system can work with ANSI and with UNICODE.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

13

THE RMZ GENERATOR

slide-95
SLIDE 95

The RMZ generator and the RMZ system are easily implemented by hardware and can be installed into a small portable digital hardware and plastic cards. There are no small portable radio telephones, cellular telephone, radio stations and plastic cards nowadays which secure the same protection and the multiuser mode.

The RMZ system allows to create completely protected computer networks based

  • n the UNIX system with remote terminals and the unlimited number of users using

the software and hardware (at the same time the RMZ protection is higher than the A1 level national protection of the USA).

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

14

THE RMZ GENERATOR

slide-96
SLIDE 96

The RMZ generator has a superhigh algebraic complexity and a great degree of unlinear structure (all parameters of the generator can be changed to any direction reducing the unlinear structures to absolutely any high power). The RMZ generator is a N-dimensional irreversible function! The internal structure of the generator allows to realize a great number of different algorithmic constructions that together with different methods of the data conversion gives a great number of algorithms (for an example: RMZ1, RMZ2,…,RMZ200,…). RMZ1, RMZ2,…,RMZ200,… - there are completely different cryptographic systems which do not decrypt each other! The RMZ generator and protection system RMZ not amenable to modern methods of cryptanalysis!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

15

THE RMZ GENERATOR

slide-97
SLIDE 97

The generator allows to generate sequences simultaneously with infinite period and with a step more (3-25):

  • random uniformly distributed sequences for operation of summation on the

module N, multiplication on the module N.

  • random uniformly distributed sequences, on all extension of period for non-

linear operation of substitution and stochastic transformation (by blocks of 256, 512, 1024 or more bytes). Quantity of blocks is limited by nothing. Quantity of substitutions which depend on transformed data or don't depend on transformed data from 28! to 232! and more (! is a factorial).

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

16

THE RMZ GENERATOR

slide-98
SLIDE 98
  • random, uniformly distributed sequences on all extension of the period for bit-

by-bit or byte-by-byte shift operation (by blocks of 256, 512, 1024 or more byte; quantity of blocks is limited by nothing). Quantity of substitutions which depend

  • n transformed data or don't depend on transformed data from 28! to 232! and

more (! is a factorial).

  • random, uniformly distributed sequences on all extension of period for other

composite mathematical non-linear operations.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

17

THE RMZ GENERATOR

slide-99
SLIDE 99

THE RANDOMNESS OF KEYS OF THE RMZ CRYPTOSYSTEM. The RMZ cryptosystem has the highest in the world indicators of the Spearman's rank correlation in the absolute uniformity! Correlation and uniformity

  • f

distribution in the RMZ generator are regulated in any limits! The Spearman's rank correlation in the absolute uniformity!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

18

THE RMZ GENERATOR

slide-100
SLIDE 100

THE RANDOMNESS OF KEYS OF THE RMZ CRYPTOSYSTEM. The table shows that the keys (sequence) generated by the RMZ system are truly random! The truly random key is one of the three conditions of the cryptosystem with absolute stability according to C. Shannon! RMZ generator is the most powerful random number generator in the world! The Spearman's rank correlation in the absolute uniformity!

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

19

THE RMZ GENERATOR

slide-101
SLIDE 101

THE GENERATOR (THE SELF-ORGANIZING PROBABILISTIC DETERMINED STRUCTURE). Entrance module.

THE SIMPLIFIED STRUCTURE OF THE RMZ ALGORITHM

The module of highly nonlinear transformation by means of irreversible functions. The transformation module

  • ver the field of real numbers.

Self-organization module. TRANSFORMATION MODULES. Multibyte gamming. N-dimensional bit-by-bit operation of scrambling. N-dimensional nonlinear operation of replacement. Other operations... Exit. N times Encryption. Decryption. The initial data. Modification. Period up to 10 5 000. Installation into any point in space. At the generator output the absolutely uniform, distributed, random sequence

  • f keys with a length

more than1024 bytes is formed. keys

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-102
SLIDE 102

THE CRYPTOGRAPHIC SYSTEM RMZ CAN'T BE HACKED EVEN AT ATTACK OF THE SUPERCOMPUTER AND THE QUANTUM COMPUTER! THE RMZ SYSTEM CAN BE DECIPHERED NEVER AND BY NOBODY AT ANY LEVEL OF DEVELOPMENT OF A SCIENCE AND COMPUTER FACILITIES

ABSOLUTE STABILITY OF THE RMZ

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-103
SLIDE 103

The best global security systems (key length up to 256 bytes and the quantity of keys up to 10300) which provide national safety of countries and at the same time can't be bought by an ordinary users:

  • can not automatically be set to any point in space,
  • can not work in real time,
  • do not protect the network,
  • can not create complex polymorphic keys,
  • can not perform complex mathematical operations on bits and bytes of data (full bit-

by-bit scrambling of a few kilobits of data by the random never repetitive evenly spaced polymorphic key),

  • can not work with the universal key, etc.

ALL THESE TASKS HAVE BEEN SOLVED IN THE RMZ!

ABSOLUTE STABILITY OF THE RMZ

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-104
SLIDE 104

Corporation IBM, IT&T and others sell a simple security system (they cost about $500 000 000) with key lengths up to 128 bits and the number of keys up to 1040 which is easily deciphered in real time using supercomputers. To create supersystem of protection like RMZ is very difficult and very expensive (ten billions dollars and ten years of work of huge collectives of scientists). It is necessary to solve the most complicated mathematical, algorithmic and program problems which are already solved in RMZ.

ABSOLUTE STABILITY OF THE RMZ

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-105
SLIDE 105

THE SELF-ORGANIZING PROBABILISTIC DETERMINED STRUCTURES

RMZ exceeds not only all already existing protection systems but also those which are being developed now including ones that are based on irreducible polynomials

  • ver Galois Field.

Annually the USA spends several billions of dollars for searching Galois irreducible polynomials and developing data protection systems. Irreducible polynomials are the polynomials which are not decomposed into non- trivial (non-constant) polynomials. Galois field (a finite field) is the field which consists of a finite number of elements. However, if irreducible polynomials over Galois Field is known for the cryptanalyst (for example, as in AES), the super computer or quantum computer easily hack such cryptosystem in real time by means of special mathematical methods of accelerated hacking (the method of hacking by direct search (“forehead”) is already irrelevant!)

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-106
SLIDE 106

In the best encryption systems that provide national and military security of the countries, at best, used irreducible polynomials over the Galois field. The using of irreducible polynomials over Galois field does NOT allow to:

  • to have an absolute uniform distribution of the numbers;
  • to obtain byte and multi-byte structures;
  • to carry out the most difficult tests of the generator, etc.

That is why the use of irreducible polynomials over Galois field doesn't allow to create a cryptosystem with absolute stability!

THE SELF-ORGANIZING PROBABILISTIC DETERMINED STRUCTURES

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-107
SLIDE 107

In the RMZ cryptosystem instead of irreducible polynomials over Galois field used self-organizing probabilistic deterministic structures that are the KNOW-HOWS and scientific development of the closed type. These structures of the RMZ cryptosystem allow:

  • to have an absolute uniform distribution of the numbers;
  • to obtain byte and multi-byte structures;
  • to carry out the most difficult operations with bits and bytes (for example, N-

dimensional bit-by-bit operation of scrambling which is not available for other cryptosystems);

  • to carry out the most difficult tests of the generator, etc.

All these possibilities of self-organizing probabilistic deterministic structures allow to create a cryptosystem with an absolute stability! More detailed differences of the RMZ cryptosystem from other cryptosystems see in the tables below.

THE SELF-ORGANIZING PROBABILISTIC DETERMINED STRUCTURES

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-108
SLIDE 108

SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G O S T B L O W F I S H 1. Protection system of «А1» level. +

  • - - - -

2. Absolute stability of the enciphering system according C. Shannon. +

  • - - - -

3. Resistance to hacking by the quantum computer. +

  • - - - -

4. Resistance to hacking by the nets from super computers. +

  • - - - -

5. Resistance to hacking by the super systems «PRISM», «TEMPORA», etc. +

  • - - - -

6. «Friend-or-foe» mode. +

  • - - - -

7. Generator installation in the any point of space up to 105 000 in real-time mode. +

  • - - - -

8. System with nondetermined encryption algorithm. +

  • - - - -

1

THE ADVANTAGES OF RMZ

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-109
SLIDE 109

SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G O S T B L O W F I S H 9. Closed scientific KNOW-HOW in the mathematical apparatus of encryption algorithm. +

  • - - - -
  • 10. New developed class of mathematical functions creating sequences (bit, byte, multibyte) which are rather

more high-power than sequences created by irreducible multinomials above Galois field. +

  • - - - -
  • 11. Possibility of carrying out of complex mathematical operations with bites and bytes of information (full bit-

to-bit scrambling of few kilobits of information by the random, never repeated equidistributed polymorphous key). +

  • - - - -
  • 12. Automatic performance of super powerful byte test «CHECK ON THE FREQUENCIES» by encryption

system. +

  • - - - -
  • 13. Automatic performance of super powerful byte test «CHARACTER-ORIENTED CHECK» by encryption

system. +

  • - - - -
  • 14. The absolute uniformity of the key gamma.

+

  • - - - -

THE ADVANTAGES OF RMZ

2

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-110
SLIDE 110

SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S Г О С Т B L O W F I S H

  • 15. Ultrahigh performance characteristics of random keys according to Spirman.

+

  • - - - -
  • 16. Bit-to-bit operation of scrambling on the whole length of the file with random changing key.

+

  • - - - -
  • 17. Operation of exchange under the control of constantly changing key (no pre-defined tables) with all kinds of

combinations. +

  • - - - -
  • 18. Synthesis of self-organizing evenly distributed byte/multibyte random sequences above any mathematical

fields. +

  • - - - -
  • 19. The generator represents a half-open set (i.e. during the work generator never degenerates) that allows to

create "infinitely" big evenly distributed random sequences. +

  • - - - -
  • 20. The generator represents a N - measurement irreversible function.

+

  • - - - -

THE ADVANTAGES OF RMZ

3

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-111
SLIDE 111

SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G O S T B L O W F I S H

  • 21. The key of opening of the initial data is very short but it is the reflection to infinite space and it is

impossible to figure it out with searching. +

  • - - - -
  • 22. Impossibility of exhaustive search of initial data and external synthesis of sequences produced with help of

initial data. +

  • - - - -
  • 23. Protection of the networks with unlimited number of users in real time.

+

  • - - - -
  • 24. Initial data is never transmitted via nets.

+

  • - - - -
  • 25. Saving of initial data in the computer in encrypted state with the same degree of encryption as the

information (in distinction from other systems user get initial data for term of life). +

  • - - - -
  • 26. Protection in the real time mode of cellular phone transmission, radio communication, satellite

communication and so on. +

  • - - - -
  • 27. Possibility of generation of universal key and work with unlimited number of users.

+

  • - - - -

THE ADVANTAGES OF RMZ

4

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-112
SLIDE 112

SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G O S T B L O W F I S H

  • 28. Unlimited number of algorithmic bases.

+

  • - - - -
  • 29. Lack of key elements in encrypted information.

+

  • - - - -
  • 30. Ultrahigh algebraic complexity of the generator.

+

  • - - - -
  • 31. Ultrahigh degree of generator nonlinearity: to change the initial data to one bit (of any byte) is just enough

to make deciphering impossible (formation of random spaces is going another way - other random keys). +

  • - - - -
  • 32. Ultrahigh algebraic complexity of the transformations.

+

  • - - - -
  • 33. Ultrahigh degree of modification methods nonlinearity: during changing of the ciphered data on one bit (of
  • ne byte) at the block cipher and deciphering of the block will be impossible.

+

  • - - - -
  • 34. Super powerful generator of random numbers which generates random, equally spaced byte/multibyte

sequences which are independently self-organize above a field of natural series of real numbers and even complex numbers. +

  • - - - -

THE ADVANTAGES OF RMZ

5

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-113
SLIDE 113

SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G О S Т B L O W F I S H

  • 35. Random number generator (not sensor of pseudorandom numbers).

+

  • - + - -
  • 36. Key is not kept with the data.

+

  • - - - -
  • 37. Availability of completely irreversible modifications in the generator work.

+

  • - - - -
  • 38. Encryption of large stream of data (video, online video conferences, exchange operations etc.) in the real

time with the program performance of encryption algorithm. +

  • - - - -
  • 39. Information which identifies users isn't stored in head office.

+

  • - - - -
  • 40. Absolute uniformity of random byte/multibyte field allows to implement bit operation of scrambling

(rearrangements) which never repeating (keys never repeat) on all bit/byte field of a ciphered file. At each step of work of the generator new random keys are developed and on the other piece of a file there is a bit- by-bit operation of scrambling. The length of a piece of a file and length of keys is limited by nothing! +

  • - - - -

THE ADVANTAGES OF RMZ

6

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-114
SLIDE 114

SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G O S T B L O W F I S H

  • 41. Absolute uniformity random byte/multibyte field allows to realize a nonlinear operation of replacement of

elements of the block of a ciphered file (stochastic transformation), byte or bit replacement (the length of the block can reach tens kilobytes). At each step of work of the generator new random keys are developed and the table of replacement is updated (table of replacement is formed by random image). +

  • - - - -
  • 42. The system allows to create random N-dimensional in space byte/multibyte length key at the output which

allows to realize various linear/nonlinear operations of enciphering at all bit field of the file and perform block-by-block or bit-by-bit encryption of any quantity of bits/bytes arriving on an entrance. +

  • - - - -
  • 43. In the process of formation of the keys there is a multifold process of nonlinear display with ruptures of the

first and second kind one set into another and N-dimensional latches for the exit in the random distributed spaces (all transformations in the work of the generator are irreversible). +

  • - - - -
  • 44. Each block of a file is encrypted by an independent key.

+

  • - - - -
  • 45. Random independent keys (not pseudorandom).

+

  • - - - -

THE ADVANTAGES OF RMZ

7

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-115
SLIDE 115

SOME ADVANTAGES OF THE RMZ RMZ P G P R S A A E S G O S T B L O W F I S H

  • 46. Multiplayer mode in real time with an unlimited number of users and an unlimited number of algorithmic

bases for each user group. +

  • - - - -
  • 47. Absolute uniformity of the byte/multibyte field.

+

  • - - - -
  • 48. The generator allows to originate the random numbers similar obtained with the help of irreducible

polynomials over Galois Field but in any range with the infinite period of repetition and in any functional environment. +

  • - - - -
  • 49. Possibility of bit-by-bit enciphering of information by the random polymorphic key (random algorithm).

+

  • - - - -
  • 50. Number of tables replacement equivalent to the number keys.

+

  • - - - -

THE ADVANTAGES OF RMZ

8

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-116
SLIDE 116

Comparative characteristics

ALGORITHMS

RMZ PGP RSA AES (RIJNDAEL) GOST 28147-89 BLOWFISH

Patent.

Not patented. Patent is not found. USA patent N 4405829. Not patented Not patented Not patented

Country.

Restricted data. USA. USA. USA. USSR/Russia. USA. Cryptographic standard. Restricted data. Unknown. Unknown. Federal USA standard of encryption since 2001. USSR State Standard of encryption since 1989. Russian State standard of encryption since 1990. Federal USA standard of encryption since 2000. Encrypting system types. Closed. Open. Open. Open. Open. Open. Degree of security. А1. C. C. C. C. C. Encryption algorithm.

  • 1. Symmetric nondeterministic

algorithm:

  • stream gamming,
  • block encryption.
  • 2. Asymmetric nondeterministic

algorithm: Algorithm with universal key – multiuser mode. Asymmetric algorithm. Asymmetric algorithm. Symmetric stream block algorithm. Symmetric stream block composite algorithm. Symmetric stream block composite algorithm.

THE ADVANTAGES OF THE CHARACTERISTICS OF RMZ

1

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-117
SLIDE 117

Comparative characteristics

ALGORITHMS

RMZ PGP RSA AES (RIJNDAEL) GOST 28147-89 BLOWFISH

Architecture. N-dimensional self-organizing probablistic determinate structures. AES + RSA. Square. Based on one known irreducible polynomial of Galois. Classical homogeneous balanced Feistel network. Balanced Feistel network. Encryption speed. Program performance: 1-10 Mbit/s and more depending

  • n the algorithm.

Hardware and software performance: 100-500 Mbit/s. It’s small if the key is long. It’s small if the key is long. ( In program performance: ≤40 kbit/s with the module lenth 512 bit). 10 Mbit/s and more. 10 Mbit/s and more. 10 Mbit/s and more. Decryption speed. Program performance: 1-10 Mbit/s and more depending

  • n the algorithm.

Hardware and software performance: 100-500 Mbit/s. It’s small if the key is long. It’s small if the key is long. 10 Mbit/s and more. 10 Mbit/s and more. 10 Mbit/s and more. Length of key. 1 024 byte, 2 048 byte, 4 096 byte, 8 192 byte, 16 384 byte and more*. * Key can have any size !!! Up to 256 bit (for symmetric algorithms). Up to 4096 bit (for the algorithms with an open key). 768 bit, 1024 bit, 2048 bit. Up to 4096 bit. 128 bit, 192 bit, 256 bit. 256 bit. 32-448 bit.

THE ADVANTAGES OF THE CHARACTERISTICS OF RMZ

2

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-118
SLIDE 118

Comparative characteristics

ALGORITHMS RMZ

PGP RSA AES (RIJNDAEL) GOST 28147-89 BLOWFISH

Quantity

  • f independent keys.

105 000 Independent keys! It’s limited by the choice of a simple number. It’s limited by the choice of a simple number. 1080 1080 1010 - 1040 Time of key generation. Real time mode. Minutes. Minutes. 30 kilobit/s with 512 bit key on the processor 2 GHz Real time mode. Real time mode. Real time mode. Block size. 256 byte, 512 byte, 1 kbyte, 2 kbyte, 4 kbyte, … , 128 kbyte and more*. * Block can have any size! Is not limited. Is not limited. 128 bit, 192 bit, 256 bit. 64 bit. 64 bit. Number of rounds. 1, 2, 3. 1. 1. 10, 12, 14. 32. 16.

THE ADVANTAGES OF THE CHARACTERISTICS OF RMZ

3

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-119
SLIDE 119

Comparative characteristics

ALGORITHMS

RMZ PGP RSA AES (RIJNDAEL) GOST 28147-89 BLOWFISH

Functions of encryption rounds. Binary additive stream ciphering. Bit-to-bit scrambling on the whole lenth of the file by the variable random equidistributed multibytes key. Non-linear operation of replacement with random equidistributed multibytes key for the block with size 256 bytes and more and other complex

  • perations.

Byte stuffing. Byte-to-byte cycle shift in matrix rows. Matrix multiplication. Exponentiation. Exponentiation. Byte stuffing. Byte-to-byte cycle shift in matrix rows. Matrix multiplication. Modular addition 232. Permutation. Ring sum. Cycle shift. Modular addition 232. Permutation. Ring sum.

Cryptostrength. When deciphering by the network of supercomputers (1 petaflops) and a quantum computer.

Decryption is not possible in real-time mode: 107 years and more*. *When the length

  • f the key:

4096 byte. Decryption in real time mode: 0,5÷1 microsecond* *When the length

  • f the key:

1024-4096 bit. Decryption in real time mode: 0,5÷1 microsecond* *When the length

  • f the key:

1024-4096 bit. Decryption in real time mode: 0,5÷1 microsecond* *When the length of the key: 256 bit. Decryption in real time mode: 0,5÷1 microsecond* *When the length of the key: 256 bit. Decryption in real time mode: 0,5÷1 microsecond* *When the length of the key: 448 bit.

THE ADVANTAGES OF THE CHARACTERISTICS OF RMZ

4

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-120
SLIDE 120

Disadvantages are not identified! Exposures are not identified! The RMZ cryptosystem hasn’t still been hacked by a supercomputer! The RMZ cryptosystem hasn’t still been hacked by a quantum computer! Time of cracking of RMZ by a supercomputer with a speed of 1 petaflop and the quantum computer is: 107 YEARS AND MORE.

EXPOSURES AND DISADVANTAGES OF THE RMZ ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-121
SLIDE 121

Repeated checks on the super computer in the leading companies of the world and at the state level of the leading countries (even on a open text) have shown unapproachable cryptostrength of the RMZ. The RMZ surpasses protection of national safety of the USA of level А1. The RMZ system is the latest word in data security which can not be decrypted at any level of science and technology development (according to Shannon's theorem). To create a supersystem of protection like RMZ is very difficult and very expensive (ten billions dollars and ten years of work of huge collectives of scientists). It is necessary to solve the most complicated mathematical, algorithmic and program problems, which are already solved in RMZ. The RMZ cryptosystem is the flagship of cryptosystems in the 21st century and has the world's highest level of cryptographic protection of information.

EXPOSURES AND DISADVANTAGES OF THE RMZ ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-122
SLIDE 122

RSA with a length of key of 4096 bits is easily hacked in real time using a supercomputer with a speed of 1 petaflop and a quantum computer in time: 0,5÷1 microsecond. Drawbacks of the skew algorithm RSA:

  • long time of encryption,
  • long key generation,
  • slow work,
  • requires high calculation power.

Due to the difficulty of realization of operations of module arithmetic, cryptoalgorithm RSA is frequently used only for encryption of small volumes of information, for example, for the distribution of secret keys or in the algorithms of digital signature, and the main part of distributed information is encrypted with the help of symmetric algorithms.

EXPOSURES AND DISADVANTAGES OF THE RSA ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-123
SLIDE 123

Among the most well-known drawbacks of the RSA algorithms we can outline incorrect choice of values of p and q. Figures p should be prime and to not be contained in any of known tables of prime numbers. These figures also should not be close to each other. . There are several ways to crack RSA:

  • the most effective attack: to find private key corresponding to the necessary

public key.

  • another way to crack RSA is to find a method of calculation of e-th root from

mod n. Method of crack is a factorization of large prime numbers which is easy to handle for supercomputers and quantum computers in real time.

EXPOSURES AND DISADVANTAGES OF THE RSA ALGORITHM

Another important problem of the RSA algorithm is the generation of large prime numbers, because using RSA cryptographic composite number is falling.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-124
SLIDE 124

The report «Efficient padding oracle attacks on cryptographic hardware»: RSA SecurID hacked in 13 minutes.

EXPOSURES AND DISADVANTAGES OF THE RSA ALGORITHM

In 2010 a group of scientists from Switzerland, Japan, France, Netherlands and USA managed to calculate data encrypted via cryptographic key of the RSA standard with the length of 768 bit. Finding out of prime factors was carried out by the general methods of number field sieve.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-125
SLIDE 125

Disadvantages of the algorithm of the RSA digital signature:

  • 1. At calculation of N module, E and D keys for the system of the RSA digital

signature it is necessary to check a large number of additional conditions. It is difficult to do it. Non-performance of any of these conditions does possible falsification of the digital signature from the one who will find such non-

  • performance. When signing important documents it is impossible to allow such
  • pportunity even theoretically.
  • 2. To ensure cryptographic security of the RSA digital signature, the computing

costs, exceeding on 20...30% computing costs of other algorithms of the digital signature with the same level of cryptographic security are required.

  • 3. The RSA digital signature is vulnerable to multiplicative attack. In other words,

the algorithm of the RSA digital signature allows the cracker to create (without knowledge of the secret key D) signatures under those documents which result

  • f hashing can be calculated as product of results of hashing of already signed

documents.

EXPOSURES AND DISADVANTAGES OF THE RSA ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-126
SLIDE 126

PGP with a length of key of 4096 bits is easily hacked in real time using a supercomputer with a speed of 1 petaflop and a quantum computer in time: 0,5÷1 microsecond. Drawbacks of skew algorithm of PGP:

  • long time of encryption,
  • long key generation,
  • slow work,
  • requires high calculation power.

EXPOSURES AND DISADVANTAGES OF THE PGP ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-127
SLIDE 127

AES with a length of key of 256 bits is easily hacked in real time using a supercomputer with a speed of 1 petaflop and the quantum computer in time: 0,5÷1 microsecond. It would be possible to refer use of irreducible polynomial over the Galois field to the advantage of the AES system. As for a supercomputer and a quantum computer this advantage comes to naught because polynomial it is general known. Drawbacks of symmetric key of AES:

  • both keys are equal;
  • it is difficult to distribute keys;
  • it does not support digital signatures.

EXPOSURES AND DISADVANTAGES OF THE AES ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-128
SLIDE 128

The drawback of symmetric encryption is the necessity of transferring the keys «from hand to hand». This drawback is rather serious because it makes impossible to use symmetric encryption in the systems with unlimited number of members. Fragility of AES to side-channel attacks. Many examples of the successful cracking of a full-round AES algorithm with the attacks on the execution time, with power consumption attacks, attacks on the basis of failures. NIST experts admitted that their choice of algorithm Rijndael as AES was wrong.

EXPOSURES AND DISADVANTAGES OF THE AES ALGORITHM

AES cannot be used to confirm authorship, because the key is known for each party.

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-129
SLIDE 129

Disadvantages of AES:

  • complexity of key control in a large network. This means quadratic increase of

the number of keys’ couples that should be generated, transmitted, stored and destroyed in the network.

  • complexity of key exchange. For application it is necessary to solve the problem
  • f reliable transmission of keys to each user as a secret channel is needed for the

transfer of each key to both parties.

EXPOSURES AND DISADVANTAGES OF THE AES ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-130
SLIDE 130

BlowFish with a length of key of 448 bits is easily hacked in real time using a supercomputer with a speed of 1 petaflop and a quantum computer in time: 0,5÷1 microsecond. Drawbacks of symmetric key BlowFish:

  • both keys are equal;
  • it is difficult to distribute keys;
  • it does not support digital signatures.

The drawback of symmetric encryption is the necessity of transferring the keys «from hand to hand». This drawback is rather serious because it makes impossible the use of symmetric encryption in the systems with unlimited number of members. .

EXPOSURES AND DISADVANTAGES OF THE BLOWFISH ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-131
SLIDE 131

The BlowFish researches showed that for this BlowFish algorithm there are weak keys (S-blocks in which there are identical words). When using such keys differential cryptoanalysis allows to restore the massif of subkeys for 8 cycles by means of 223 chosen clear texts, and for 16 cycles - by means of 3·251 chosen clear texts. If weak keys aren't used, for 8 cycles it is possible to restore the massif of subkeys by means of 248 chosen clear texts. The BlowFish system is unsuitable for use in systems where the key often changes, and small volume of data is ciphered on each key. Serious requirements to memory don't allow to use the BlowFish algorithm in smart cards.

EXPOSURES AND DISADVANTAGES OF THE BLOWFISH ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-132
SLIDE 132

John Kelsey developed attack which allowed to crack the 3-iterative BlowFish. This attack leans on the fact that addition operators of the module 232 and XOR aren't commutative. It is impossible to use BlowFish for authorship confirmation as the key is known to each party. BlowFish has slow installation of a key. Complexity of control of BlowFish keys in a large network means the quadratic increase of number of keys couples which should be generated, transferred, stored and destroyed in a network.

EXPOSURES AND DISADVANTAGES OF THE BLOWFISH ALGORITHM

Complexity of key exchange. For application it is necessary to solve the problem

  • f reliable transmission of keys to each user as a secret channel is needed for the

transfer of each key to both parties

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-133
SLIDE 133

Impossibility of key expansion parallel to enciphering process. The small size of the block of ciphered data.

EXPOSURES AND DISADVANTAGES OF THE BLOWFISH ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-134
SLIDE 134

Drawbacks of symmetric key GOST28147-89:

  • both keys are equal;
  • it is difficult to distribute keys;
  • it does not support digital signatures.

GOST 28147-89 with a length of key of 256 bits is easily hacked in real time using a supercomputer with a speed of 1 petaflop and a quantum computer in time: 0,5÷1 microsecond. The drawback of GOST28147-89 is the necessity of transferring the keys «from hand to hand». This drawback is rather serious because it makes impossible the use of symmetric encryption in the systems with unlimited number of members.

EXPOSURES AND DISADVANTAGES OF THE GOST28147-89 ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-135
SLIDE 135

It is considered that GOST28147-89 has «weak» keys and substitution tables. The drawback of GOST28147-89 is a weak key data. Obviously, zero key and trivial table of substitutes according to which any value is replaced with itself are

  • weak. Cipher is rather easily cracked in case of usage one of them, independently of

the second element value. Program realization is very difficult and almost does not have any sense due to the low performance. It is impossible to use GOST28147-89 for authorship confirmation as the key is known to each party.

EXPOSURES AND DISADVANTAGES OF THE GOST28147-89 ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-136
SLIDE 136

Complexity of control of keys in a large network: the quadratic increase of number

  • f keys couples which should be generated, transferred, stored and destroyed in a

network. Complexity of key exchange. For application it is necessary to solve the problem

  • f reliable transmission of keys to each user as a secret channel is needed for the

transfer of each key to both parties.

EXPOSURES AND DISADVANTAGES OF THE GOST28147-89 ALGORITHM

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!

slide-137
SLIDE 137

FOR THE FIRST TIME IN THE WORLD! THE CRYPTOGRAPHIC SYSTEM WITH ABSOLUTE STABILITY!