Loading
Created by:avishekavishek
{"id":938052,"type":0,"block_id":"avishek_1366095403","theme_id":30,"user_id":321867,"path":"encryption-556911","title":"","pubtitle":" encryption","tags":"","public":true,"publicAccess":true,"private_link_enabled":0,"thumb":"https://s3-eu-west-1.amazonaws.com/infogram-thumbs-200/avishek_1366095403.jpg","width":682,"copyright":"Clape","properties":{"social":"google","publishType":0,"exportsettings":"{\"CHART_1441019\":[],\"CHART_1441824\":[],\"CHART_1441978\":[],\"CHART_1442101\":[],\"CHART_1442179\":[],\"CHART_1442291\":[]}","transparent":false,"rtl":false,"export_settings":{"showGrid":true,"showValues":true},"whitelabel":false,"embed_button":"enabled","title_link":"infogram","custom_logo":"infogram","custom_link_url":"","embed_button_text":"Share","decimal_separator":".,"},"elements":[{"type":"particle","particle_id":927127,"object_id":"avishek1366109883","particle_type":"bodytext","picture":null,"text":"Asansol Astha IT Projects (P) Ltd. is an well-established, result-oriented IT Solutions Company. We are highly client-oriented and quality-conscious and our portfolio basket includes a wide range of services and solutions in the area of Data Security & Business Applications. \n\nClape Technologies Ltd (A sister organization of Asansol Astha IT Projects (P) Ltd.) is working upon the patent pending symmetric key encryption standard and the Abstract of the patent application is detailed below.","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927356,"object_id":"avishek1366112103","particle_type":"bodytext","picture":null,"text":" ----------------------Abstract of the Patent Application for Symmetric Key Encryption Standard----------------------------","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927361,"object_id":"avishek1366112130","particle_type":"bodytext","picture":null,"text":"The present invention relates to a system and a method for secured transmission of data. The method comprises the steps of providing the data, generating a password or a key by a user, encrypting the data by the password or the key for plural number of times resulting plurality of cipher texts, sending plurality of the cipher texts and the password or key, and decryption the cipher text by the password or the key. The system comprises input device means for providing the data, input device means for generating a password by a user, processor means encrypting the data by the password or key for plural number of times resulting plurality of cipher texts, means for sending the plurality of cipher texts and the password and means for decryption the cipher text by the password or key.","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927632,"object_id":"avishek1366114273","particle_type":"bodytext","picture":null,"text":"What the Company does","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927606,"object_id":"avishek1366114108","particle_type":"bodytext","picture":null,"text":" Our Company has conceived a Symmetric Key Encryption Standard and has filed for patenting in Indian Patent Office vide application no.0992/KOL/2011 dated. 26.07.2011 in Kolkata Patent Office Entitled as “A SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC COMMUNICATIONS.” And was published in the Indian Patent Office Journal on 2nd December 2011. Moreover we have applied for patenting in USPTO vide application no 13/557112 date 24.07.2012 and was published in USPTO Journal on 31.12.2012\n\n••The Company has also applied for a Asymmetric Key cryptographic Standard and has filed for patenting in Indian Patent Office (I.P.O Kolkata ) vide application no.446/KOL/2012 dated. 19/04/2012 in Kolkata Patent Office Entitled as “METHOD FOR ESTABLISHING SECURE COMMUNICATION IN A NETWORK AND SYSTEM THEREOF” And was published in the Indian Patent Office(IPO) Journal on 24/08/2012","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927680,"object_id":"avishek1366114459","particle_type":"bodytext","picture":null,"text":"Technology","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927669,"object_id":"avishek1366114400","particle_type":"bodytext","picture":null,"text":"Every block cipher involves a transformation of a block of plain text into block of cipher text, where the transformation depends on the cipher key. The mechanism of our encryption procedure seeks to make the statistical relationship between the plain text and the cipher text as 0complex as possible to prevent attempts to derive the cipher key.\nThe technology a basic building block, which encrypts / decrypts a fixed size block of data, however to use these in practice, we usually need to handle arbitrary amount of data , which may be available in advance, (in which case a block mode is appropriate).","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927705,"object_id":"avishek1366114660","particle_type":"bodytext","picture":null,"text":"•Block size: with a view to improve security the block size has been increased but without any compromise to the speed of the procedure.\n\n•Key Size: increasing size improves security, makes exhaustive key searching harder but without any compromise with the speed of encryption / decryption function.\n\n•Number of rounds: increasing number of rounds in our technology shall improve security but without slowing the Cipher Generatio Procedure.","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927723,"object_id":"avishek1366114805","particle_type":"bodytext","picture":null,"text":"CLAPE CIPHER DESIGN PRINCIPLES ","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927718,"object_id":"avishek1366114767","particle_type":"bodytext","picture":null,"text":"It encrypts 1024 bit blocks of plain text with the Cipher Key having same size of bits, using appropriate iterations of an elaborate combination of table look up and bits rearrange. \n\nThrough this procedure the password key is being made into a 1024 bit block size and correspondingly a chunk of plain text of same bit size are being put into our own encryption algorithm to generate a chunk of cipher text.\nIt is commonly believed that the strength of the Password much depends on the method how the encryption algorithm is deployed. \n\nIn practicality, it has been observed that the user doesn't always want to use password as long as needed for effective key generation.\nAs such responsibility of securing the password of the user rests on the Encryption Technology.\n\nThere is no need for using salts/pass phrases in this technology for strengthening the password what any common user tends to apply to achieve utmost security.","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927749,"object_id":"avishek1366114937","particle_type":"bodytext","picture":null,"text":"Our objective","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927732,"object_id":"avishek1366114906","particle_type":"bodytext","picture":null,"text":"The Cryptographic community needs to provide the world with a new encryption standard.\nThe few workhorse algorithms for the last few decades are nearing the end of their useful life cycle.\nMoreover the recent attacks as evident in the following links provided herein:- \n\nwww.forbes.com/sites/andygreenberg/ 2013/03/13/cryptographers_show_mathematically_crackable_flaws_in_common_web_encryption/\n\nwww.arstechnica.com/security/2013/02/lucky_thirteen_attacks_snarfs_cookies_protected_by_SSL_encryption/\n\nwww.theregister.co.uk/2011/09/19/beast_exploits_paypal_SSL/\n\nwww.isg.rhul.ac.uk/tls/TLS timing.pdf on Padding Oracle attack\n\n","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927796,"object_id":"avishek1366115043","particle_type":"bodytext","picture":null,"text":"In this contest if the world is to have a secure reliable and easily available encryption algorithm by the turn of the decade the world needs several candidate symmetric Key encryption algorithms now. These algorithms have to be subjected to years of public scrutiny and cryptanalysis. We are confident that our encryption standard will survive this process and shall eventually become a new standard. \n\nTHIS STUDY EVALUATES SEVEN DIFFERENT ENCRYPTION ALGORITHMS NAMELY; AES, DES, 3DES, RC6, BLOWFISH, RC2 & CLAPE. THE PERFORMANCE MEASURE OF ENCRYPTION SCHEMES WILL BE CONDUCTED IN TERMS OF CHANGING FILE SIZE FOR THE SELECTED CRYPTOGRAPHIC ALGORITHMS. \n\nThe comparison has been conducted for those encryption algorithms with clape at different settings for each algorithm such as; different sizes of data blocks different key size and finally encryption decryption speed.","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":925215,"object_id":"avishek_1366095403","particle_type":"bodytext","picture":null,"text":" Time Comparison of encryption algorithms\n\n","content_type":"","title":null,"shrink":null},{"type":"chart","chart_id":1441019,"object_id":"avishek_1366095480","chart_type_nr":6,"data":[[["","46.9k byte","59 k byte","100k byte","247k byte","321 k byte","694 k byte","899 k byte","963 k byte","5345.2 k bytes","7310.3 k bytes"],["BlowFish","36","36","37","45","45","46","64","66","122","107"],["Rc6","41","24","60","77","109","123","162","125","695","756"],["AES","56","38","90","112","164","210","258","208","1237","1366"],["DES","29","33","49","47","82","144","240","250","1296","1695"],["3DES","54","48","81","111","167","226","299","283","1466","1786"],["RC2","57","60","91","121","168","262","268","295","1570","1915"],["Our Technology","15","21","27.3","29.4","36","45","56","57.5","216","265"]]],"custom":{"smooth":true,"grid":true,"showPoints":false,"reverse":false,"height":"372","xlabel":"Bytes","ylabel":"Milli Seconds","legacyTransposeDone":true,"switchRowsColumns":true},"colors":["#8c2c0e","#a7e14c","#f28a35","#f3d4b5","#00668e","#6db8db","#ff414d","#c0dfe5","#3d3021","#534741","#77665b","#afa89e","#885242","#d18358","#da987c","#dbc2a9","#457588","#84aec2","#a5c5cf","#c5d4d6","#524f4b","#676462","#897c74","#c4c1be"],"dimensions":[],"modifier":0,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":925980,"object_id":"avishek1366102518","particle_type":"bodytext","picture":null,"text":"Time comparison different encryption algorithms during decryption \n","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":1441824,"object_id":"avishek_1366102357","chart_type_nr":6,"data":[[["","49k byte","59 k byte","100k byte","247k byte","321 k byte","694 k byte","899 k byte","963 k byte","5345.2 k bytes","7310.3 k bytes"],["BlowFish","38","26","52","66","92","89","102","80","149","140"],["Rc6","35","28","58","66","100","119","150","116","684","745"],["AES","63","58","60","76","149","142","171","164","655","882"],["DES","50","42","57","72","74","120","152","157","783","953"],["3DES","53","51","57","77","87","147","171","177","835","1101"],["RC2","65","59","90","95","161","165","183","194","904","1216"],["Our Technology ","12.5","15.2","15","27.8","37","71","78","84","249","265"]]],"custom":{"height":"372","ylabel":"Milli Seconds","xlabel":"Bytes","legacyTransposeDone":true,"switchRowsColumns":true},"colors":["#8c2c0e","#d85128","#f28a35","#71933b","#00668e","#6db8db","#ff414d","#c0dfe5","#3d3021","#534741","#77665b","#afa89e","#885242","#d18358","#da987c","#dbc2a9","#457588","#84aec2","#a5c5cf","#c5d4d6","#524f4b","#676462","#897c74","#c4c1be"],"dimensions":[],"modifier":0,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":926182,"object_id":"avishek1366103981","particle_type":"bodytext","picture":null,"text":"Encryption Time in Milliseconds\n","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":1441978,"object_id":"avishek_1366103480","chart_type_nr":1,"data":[[["","100kb","500kb","1MB","2MB","5MB","10MB","50MB"],["RC4","14.4","47.7","97","218","500.7","982","4518.7"],["ECB","32","90","155","345.3","626","1177","5719"],["CBC","29.7","97.3","183","382.7","678","1359","6658"],["CFB","31","100","186.7","364.3","696.7","1367","6426"],["Our Technology ","145","141","157","186","252","274","1435"]]],"custom":{"height":"372","grid":true,"absoluteDistribution":true,"legacyTransposeDone":true,"switchRowsColumns":true},"colors":["#8c2c0e","#01c4f5","#f28a35","#339bd6","#ff414d","#6db8db","#9ad3e5","#c0dfe5","#3d3021","#534741","#77665b","#afa89e","#885242","#d18358","#da987c","#dbc2a9","#457588","#84aec2","#a5c5cf","#c5d4d6","#524f4b","#676462","#897c74","#c4c1be"],"dimensions":[],"modifier":1,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":926281,"object_id":"avishek1366104408","particle_type":"bodytext","picture":null,"text":"Decryption Time in Milliseconds\n","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":1442101,"object_id":"avishek_1366104185","chart_type_nr":1,"data":[[["","100kb","500kb","1MB","2MB","5MB","10MB","50MB"],["RC4","15","50.3","96.7","219.7","438","895","4089"],["EBC","31","93.3","167.7","346","640","1321","5474"],["CBC","31","100","183","362","712","1389","6774.7"],["CFB","31","101.7","186.7","381","770.7","1330","6147"],["Our Technology ","93","102","175","138","227","387","1653"]]],"custom":{"grid":true,"absoluteDistribution":true,"height":"372","legacyTransposeDone":true,"switchRowsColumns":true},"colors":["#8c2c0e","#d85128","#f28a35","#a7e14c","#ff414d","#6db8db","#9ad3e5","#c0dfe5","#3d3021","#534741","#77665b","#afa89e","#885242","#d18358","#da987c","#dbc2a9","#457588","#84aec2","#a5c5cf","#c5d4d6","#524f4b","#676462","#897c74","#c4c1be"],"dimensions":[],"modifier":1,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":926437,"object_id":"avishek1366105319","particle_type":"bodytext","picture":null,"text":"Encryption Time (in milliseconds)\n","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":1442179,"object_id":"avishek_1366104707","chart_type_nr":1,"data":[[["","2MB","5MB","10MB","50MB"],["RC4","218","500.7","982","4518.7"],["ECB","345.3","626","1177","5719"],["CBC","382.7","678","1359","6658"],["CFB","364.3","696.7","1367","6426"],["Our Technology ","186","252","274","1435"]]],"custom":{"height":"372","legacyTransposeDone":true,"switchRowsColumns":true},"colors":["#8c2c0e","#d85128","#f28a35","#f3d4b5","#ff414d","#6db8db","#9ad3e5","#c0dfe5","#3d3021","#534741","#77665b","#afa89e","#885242","#d18358","#da987c","#dbc2a9","#457588","#84aec2","#a5c5cf","#c5d4d6","#524f4b","#676462","#897c74","#c4c1be"],"dimensions":[],"modifier":1,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":926463,"object_id":"avishek1366105445","particle_type":"bodytext","picture":null,"text":"Decryption Time (in milliseconds)","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":1442291,"object_id":"avishek_1366105372","chart_type_nr":1,"data":[[["","2MB","5MB","10MB","50MB"],["RC4","219.7","438","895","4089"],["EBC","346","640","1321","5474"],["CBC","362","712","1389","6774.7"],["CFB","381","770.7","1330","6147"],["Our Technology ","138","227","387","1653"]]],"custom":{"height":"372","legacyTransposeDone":true,"switchRowsColumns":true},"colors":["#8c2c0e","#d85128","#f28a35","#f3d4b5","#ff414d","#6db8db","#9ad3e5","#c0dfe5","#3d3021","#534741","#77665b","#afa89e","#885242","#d18358","#da987c","#dbc2a9","#457588","#84aec2","#a5c5cf","#c5d4d6","#524f4b","#676462","#897c74","#c4c1be"],"dimensions":[],"modifier":1,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":928251,"object_id":"avishek1366118011","particle_type":"bodytext","picture":null,"text":"Graph showing time consumption for encryption with different key sizes for a specific size of File (7.14MB).","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927929,"object_id":"avishek1366115865","particle_type":"image","picture":"http://s3-eu-west-1.amazonaws.com/infogram-particles-700/avishek1366115865.png"},{"type":"particle","particle_id":928263,"object_id":"avishek1366118101","particle_type":"bodytext","picture":null,"text":"Graph showing time consumption for decryption with different key sizes for a specific size of File (7.14MB).","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927977,"object_id":"avishek1366116153","particle_type":"image","picture":"http://s3-eu-west-1.amazonaws.com/infogram-particles-700/avishek1366116153.png"},{"type":"particle","particle_id":928241,"object_id":"avishek1366117922","particle_type":"bodytext","picture":null,"text":"Graph showing time consumption for encryption with different key sizes for a specific size of File (694 Kb)","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":928003,"object_id":"avishek1366116272","particle_type":"image","picture":"http://s3-eu-west-1.amazonaws.com/infogram-particles-700/avishek1366116272.png"},{"type":"particle","particle_id":928275,"object_id":"avishek1366118186","particle_type":"bodytext","picture":null,"text":"Graph showing time consumption for decryption with different key sizes for a specific size of File (694 Kb)","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":927948,"object_id":"avishek1366115998","particle_type":"image","picture":"http://s3-eu-west-1.amazonaws.com/infogram-particles-700/avishek1366115998.png"}],"theme":{"createdAt":"2016-04-22T04:54:07.000Z","updatedAt":"2016-12-28T10:33:20.000Z","logoImages":[""],"charts":{"wordcloud":{"labels":{"fontWeight":"700","fontFamily":"Arial"}},"treemap":{"labels":{"value":{"fontFamily":"PT Sans Narrow"},"name":{"fontWeight":"700","fontFamily":"PT Sans Narrow"}}},"table":{"cellBackground":"#efede6","headerBackground":"#d7d5cf","cellColor":"#534741","headerColor":"#534741","shapeFill":"#232323"}},"color":{"bg":"#efede6","text":"#000000","chart":{"bg":"transparent","text":"#534741"},"element":{"bg":"transparent","text":"#000000"}},"colorPresets":[],"localFonts":[],"font":{"common":{"textAlign":"initial","fontSize":"16","fontStyle":"normal","fontWeight":"400","fontFamily":"PT Sans Narrow"},"legend":{"fontSize":"16","fontWeight":"400"},"label":{"fontSize":16,"fontWeight":400}},"fontPresets":[],"fontFamilies":["Dosis","PT Sans","PT Sans Narrow","Arial Narrow"],"id":30,"title":"Squared-new","usergroup":"archived","picture":"https://d1m5pq7b4fzvad.cloudfront.net/30/thumbnail.png","thumb":"/i/templates/S/square.png","order":29,"public":0,"width":550,"fonts":"Dosis","colors":["#8c2c0e","#d85128","#f28a35","#f3d4b5","#00668e","#6db8db","#9ad3e5","#c0dfe5","#3d3021","#534741","#77665b","#afa89e","#885242","#d18358","#da987c","#dbc2a9","#457588","#84aec2","#a5c5cf","#c5d4d6","#524f4b","#676462","#897c74","#c4c1be"],"logocolor":"534741","logoUrl":"","showLogo":"","showEmbed":"","embedButtonText":"Share","top":30,"padding":0,"spacing":20,"shrinkMargin":0,"shrinkPadding":0,"spacingElementMin":null,"spacingElementMax":null,"css":".igc-textual-figure {\n\tfont-size: 45px;\n}\n.igc-sheets .igc-sheet .igc-sheet-ico,\n.igc-sheets .igc-sheet:hover .igc-sheet-ico {\n\tborder-color: #3e372b;\n}\n.igc-sheets .igc-sheet .igc-sheet-label,\n.igc-sheets .igc-sheet:hover .igc-sheet-label,\n.igc-sheets .igc-sheet.active .igc-sheet-label {\n\tcolor: #7d7d7d;\n}\n.igc-sheet .igc-sheet-ico,\n.igc-sheet.active .igc-sheet-ico {\n\tbackground: white;\n}\n.igc-sheets .igc-sheet.active .igc-sheet-ico::after,\n.igc-sheets .igc-sheet:hover .igc-sheet-ico::after {\n\theight: 14px;\n\twidth: 14px;\n\tleft: 2px;\n\ttop: 2px;\n\tbackground: #3e372b;\n}\n.igc-table-scroll {\n\tbackground: #fffdf3;\n}\n.igc-table .igc-table-cell {\n\tfont-size: 16px;\n\tborder-width: 0px;\n}\n.igc-table .igc-table-header {\n\tfont-size: 16px;\n\tfont-weight: bold;\n\tborder-width: 0px;\n}\n.ig-container {\n\tbackground: #efede6 url(/i/templates/30/pattern-square-new.png);\n}\n#footer {\n\tpadding-left: 10px;\n\tpadding-right: 20px;\n\tmargin-top: 10px;\n\tmin-height: 45px !important;\n}\n.headline {\n\tbackground: url(/i/templates/30/title-shape-up.png) 0% 0% repeat-x;\n\tpadding-top: 10px;\n\tline-height: initial;\n}\n.headline .maintitle {\n\tfont-family: Dosis;\n\tfont-weight: 400;\n\tfont-size: 55px;\n\tcolor: #d94f25;\n\ttext-transform: uppercase;\n\ttext-align: center;\n\tpadding-bottom: 10px;\n\tbackground: url(/i/templates/30/title-shape-down.png) 0% 100% repeat-x;\n}\n.headline span,\n.headline .innertext {\n\tbackground: #Fffdf3;\n\tpadding-left: 20px;\n\tpadding-right: 20px;\n\tpadding-top: 5px;\n\tpadding-bottom: 5px;\n}\n.headline span + span {\n\tmargin-top: -20px;\n}\n.chart-title {\n\tfont-family: Dosis;\n\tfont-weight: 400;\n\tfont-size: 32px;\n\tcolor: #d94f25;\n\tbackground: url(/i/templates/30/title-shape-up.png) 0% 0% repeat-x;\n\tpadding-top: 10px;\n}\ndiv.quoted {\n\tmargin-right: 20px;\n\tmargin-left: 20px;\n}\n.bodytitle {\n\tpadding-bottom: 10px;\n\tbackground: url(/i/templates/30/title-shape-down.png) 0% 100% repeat-x;\n}\n.chart {\n\tmargin-left: 20px;\n\tmargin-right: 20px;\n}\n.chart > .inner {\n\tpadding-left: 20px;\n\tpadding-right: 20px;\n}\n.chart > .igc-chart.inner {\n\tpadding-left: 0px;\n\tpadding-right: 0px;\n}\n.bodytitle .innertext {\n\tbackground: #fffdf3;\n\ttext-align: center;\n\tpadding-left: 30px;\n\tpadding-right: 30px;\n\tpadding-top: 3px;\n\tpadding-bottom: 3px;\n}\n.bodytext {\n\tfont-family: Dosis;\n\tpadding-left: 40px;\n\tpadding-right: 40px;\n\tfont-size: 17px;\n\tcolor: #534741;\n}\n.quote {\n\ttext-align: center;\n\tfont-family: Dosis;\n\tfont-weight: 400;\n\tfont-size: 34px;\n\tcolor: #d94f25;\n\ttext-transform: uppercase;\n\tpadding-left: 70px;\n\tpadding-right: 70px;\n}\n.quotetitle {\n\tfont-size: 27px;\n}\n.quote:before, .quote:after {\n\tcontent: '';\n\tposition: absolute;\n\ttop: 0;\n\tleft: 0;\n\twidth: 46px;\n\theight: 40px;\n\tbackground: url(/i/templates/30/quote.png) no-repeat;\n}\n.quote:after {\n\tright: 0;\n\tleft: auto;\n}\n.ig-copyright {\n\tcolor: #534741;\n}\n#madewith a,\n#madewith a:hover,\n#madewith a:active,\n#madewith a:link,\n#madewith a:visited {\n\tcolor: #534741 !important;\n}\n.headline.active:hover {\n\tcolor: #8c2c0e;\n}\n#madewith.active a:hover {\n\tcolor: #8c2c0e !important;\n}\n.titlepopup {\n\ttop: 6px;\n}\n.titlepopup1,\n.titlepopup2 {\n\tborder-color: #8c2c0e;\n}\n.shrink .quotetext, .shrink .quotetitle {\n\tpadding-left: 50px;\n}\n.shrink .chart > .inner {\n\tpadding-left: 10px;\n\tpadding-right: 10px;\n}\n.shrink .chart {\n\tmargin-left: 0;\n\tmargin-right: 0;\n}\n.shrink .quote:after {\n\tdisplay: none;\n}\n.ig-separator-line {\n\tbackground: rgba(83, 71, 65, 0.5);\n}\n.heatmap-legend {\n\tbackground: rgba(239, 237, 230, 0.7);\n}\n.heatmap-legend-item,\n.heatmap-label {\n\tcolor: #534741;\n\tfont-size: 11px;\n\tfont-family: PT Sans;\n}\n.igc-graph-pie-piece {\n\tstroke: rgba(239, 237, 230, 0.7);\n}\n.igc-tabs .igc-tab-active {\n background: #efede6;\n }\n .igc-tabs .igc-tab .igc-tab-content,\n .igc-tabs .igc-tab.icon-down:after {\n font-family: PT Sans Narrow;\n color: #000000;\n font-weight: 400;\n }\n .igc-tabs .igc-tab,\n .igc-tab-switcher {\n color: #000000;\n } .igc-tabs.igc-tabs-dropdown .igc-tab-name {\n font-family: PT Sans Narrow;\n color: #000000;\n font-weight: 400;\n } .captiontext {font-family: PT Sans Narrow;color: #000000;font-weight: 400;} .captiontext .innertext {line-height: 1.5;}","chartOptions":{"pictobar":{"fill":"8c2c0e","shapeStyleEmpty":{"fill":"#fffdf3"}},"progress":{"backgroundInactive":{"fill":"#fffdf3"}},"waterfall":{"colors":"00668e 534741 d85128"},"candle":{"colors":"534741 d85128 "},"gauge":{"_gaugeTextOptions":{"backgroundStyle":{"fill":"transparent","stroke":"transparent"},"labelFontStyle":{"font-family":"PT Sans Narrow, Arial Narrow","font-size":17,"text-anchor":"start","fill":"#534741","cursor":"default"}},"gaugeStyle":{"stroke-width":1,"stroke":"#534741","fill":"#fffdf3"},"gaugeFillStyle":{"stroke-width":1,"stroke":"#534741","fill":"#d94f25"},"gaugeNeedleStyle":{"stroke-width":0,"stroke-opacity":0,"fill":"#534741"}},"map":{"showLegend":false,"countryyStroke":"#fffdf3","countryFill":"#fffdf3","canvasFill":"transparent"},"common":{"backgroundStyle":{"fill":"transparent","stroke-opacity":0,"stroke-width":0,"stroke":"none"},"_categoryOptions":{"backgroundStyle":{"fill":"#fffdf3"}},"textStyle":{"font-family":"PT Sans Narrow, Arial Narrow","font-size":16,"cursor":"default","fill":"#534741"},"_gridOptions":{"marginLineStyle":{"stroke-width":0,"stroke":"none","stroke-opacity":0},"fontStyle":{"font-family":"PT Sans","font-size":11,"text-anchor":"start","fill":"#534741","cursor":"default"},"lineStyle":{"stroke-width":1,"stroke":"#534741","stroke-dasharray":"."}},"legendOptions":{"font-size":16,"font-family":"PT Sans Narrow"},"tooltipOptions":{"nameFontStyle":{"font-family":"PT Sans Narrow","font-weight":700,"text-anchor":"start","font-size":16,"fill":"#ffffff"},"valueFontStyle":{"font-family":"PT Sans Narrow","font-size":16,"text-anchor":"start","fill":"#fff"},"containerStyle":{"stroke":"#464646","fill":"#464646"}}}},"version":1,"archived":true,"tabs":false,"zeroPaddingEmbed":true,"created_at":"2016-04-22T04:54:07.000Z","updated_at":"2016-12-28T10:33:20.000Z"},"embed":"<script id=\"infogram_0_encryption-556911\" title=\"\" src=\"//e.infogr.am/js/dist/embed.js?uEJ\" type=\"text/javascript\"></script><div style=\"padding:8px 0;font-family:Arial!important;font-size:13px!important;line-height:15px!important;text-align:center;border-top:1px solid #dadada;margin:0 30px\"><a href=\"https://infogr.am/encryption-556911\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\"> encryption</a><br><a href=\"https://infogr.am\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Create your own infographics</a></div>","embedIframe":"<iframe src=\"//e.infogr.am/encryption-556911?src=embed\" title=\"\" width=\"682\" height=\"\" scrolling=\"no\" frameborder=\"0\" style=\"border:none;\"></iframe><div style=\"padding:8px 0;font-family:Arial!important;font-size:13px!important;line-height:15px!important;text-align:center;border-top:1px solid #dadada;margin:0 30px\"><a href=\"https://infogr.am/encryption-556911\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\"> encryption</a><br><a href=\"https://infogr.am\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Create your own infographics</a></div>","embedWordpress":"[infogram id=\"encryption-556911\" prefix=\"cXN\" format=\"interactive\" title=\"\"]","embedWordpressImage":"[infogram id=\"encryption-556911\" prefix=\"oWo\" format=\"image\" title=\"\"]","embedAsync":"<div class=\"infogram-embed\" data-id=\"encryption-556911\" data-type=\"interactive\" data-title=\"\"></div><script>!function(e,t,n,s){var i=\"InfogramEmbeds\",o=e.getElementsByTagName(t),d=o[0],a=/^http:/.test(e.location)?\"http:\":\"https:\";if(/^\\/{2}/.test(s)&&(s=a+s),window[i]&&window[i].initialized)window[i].process&&window[i].process();else if(!e.getElementById(n)){var r=e.createElement(t);r.async=1,r.id=n,r.src=s,d.parentNode.insertBefore(r,d)}}(document,\"script\",\"infogram-async\",\"//e.infogr.am/js/dist/embed-loader-min.js\");</script><div style=\"padding:8px 0;font-family:Arial!important;font-size:13px!important;line-height:15px!important;text-align:center;border-top:1px solid #dadada;margin:0 30px\"><a href=\"https://infogr.am/encryption-556911\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\"> encryption</a><br><a href=\"https://infogr.am\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Create your own infographics</a></div>","embedImageAsync":"<div class=\"infogram-embed\" data-id=\"encryption-556911\" data-type=\"image\" data-title=\"\"></div><script>!function(e,t,n,s){var i=\"InfogramEmbeds\",o=e.getElementsByTagName(t),d=o[0],a=/^http:/.test(e.location)?\"http:\":\"https:\";if(/^\\/{2}/.test(s)&&(s=a+s),window[i]&&window[i].initialized)window[i].process&&window[i].process();else if(!e.getElementById(n)){var r=e.createElement(t);r.async=1,r.id=n,r.src=s,d.parentNode.insertBefore(r,d)}}(document,\"script\",\"infogram-async\",\"//e.infogr.am/js/dist/embed-loader-min.js\");</script><div style=\"padding:8px 0;font-family:Arial!important;font-size:13px!important;line-height:15px!important;text-align:center;border-top:1px solid #dadada;margin:0 30px\"><a href=\"https://infogr.am/encryption-556911\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\"> encryption</a><br><a href=\"https://infogr.am\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Create your own infographics</a></div>"}