Jul 162017
 

Kyoto University demonstrates the security of a cipher based on chaos theory.
CREDIT
Kyoto Univeristy / Eiri Ono

Kyoto University demonstrates the strength of its new cipher

How do we know if the electronic keys we use in our devices are really secure?

While it is possible to rigorously test the strength of a cipher — a kind of digital data lock — there are rarely any definitive proofs of unbreakability. Ciphers are highly complex, and while they may ward off certain attacks, they might be vulnerable to others.

Now, in a series of papers published in IEEE Transactions on Information Forensics and Security and IEICE Nonlinear Theory and Its Applications, researchers from Kyoto University have definitively demonstrated the strength of a cipher which is based on principles of chaos theory.

The group’s Vector Stream Cipher — or VSC — this is the first example of a 128-bit key chaotic cipher with provable security.

“We first developed VSC in 2004 as a simple, fast cipher, and parts of it have already been utilized in the private sector,” explains Ken Umeno, leader of the study. “Many theoretical attacks in the past have failed to break it, but until now we hadn’t shown definitive proof of security.”

The researchers conducted a number of tests, such as a method to evaluate the lock’s randomness. Many ciphers rely on number sequences that appear to be random, but are actually generated through recurring relations that are vulnerable to being reproduced.

“Before evaluating the security of VSC with randomness tests, we found a way to make it significantly more reliable and sensitive,” continues Umeno. “We then continued this refinement during the actual investigation.”

The research highlights that VSC is not only secure, but structurally simple and low on memory usage compared with existing technology, making it useful for high-density data transmission applications such as in 5G mobile networks and 4K television broadcasts.

Umeno concludes, “Chaotic ciphers have been in use for about 30 years, but before this study we had not expected to find proof of security. We hope that our work will be studied widely and applied throughout our digital world.”

Learn more: Shh! Proven security for your secrets

 

The Latest on: Chaotic cipher
  • triple key.pdf
    on September 19, 2017 at 8:39 pm

    Abstract-Many methods have been put forth to perform image intermediate key is combined with the initial parameter key encryption using Chaotic Neural Networks. In this paper, and the control parameter key which are then used to generate another method of ... […]

  • SNEAK PEEK: Read the first chapter of Dan Brown’s new book
    on September 19, 2017 at 5:10 am

    Some twenty years ago, young Eddie Kirsch had been one of Langdon’s first students at Harvard University — a mop-haired computer geek whose interest in codes had led him to Langdon’s freshman seminar: Codes, Ciphers ... the chaotic mass of shapes ... […]

  • Professor Langdon returns: Exclusive excerpt from Dan Brown’s new novel, Origin
    on September 15, 2017 at 12:11 pm

    Some twenty years ago, young Eddie Kirsch had been one of Langdon’s first students at Harvard University—a mop-haired computer geek whose interest in codes had led him to Langdon’s freshman seminar: Codes, Ciphers ... the chaotic mass of shapes ... […]

  • Why President Trump could cost US cloud computing providers more than $10 billion by 2020
    on September 14, 2017 at 3:28 am

    Likewise, in June the latest CNBC Global CFO Council survey reported that CFOs representing some of the largest public and private companies in the world variously described Trump’s leadership as chaotic ... data privacy and encryption in the US. […]

  • Quantum Chaotic Image Encryption with One Time Running Key
    on September 14, 2017 at 2:45 am

    To improve image encryption mechanism and enhance the security of pixel value transformation, a new image encryption scheme is proposed based on quantum chaos. In the phase of key generation, running key related to plaintext is generated by cipher-text ... […]

  • Three Industries That Are Affected by Cyber Attacks More Than You’d Think
    on September 13, 2017 at 12:09 pm

    In fact, the industries you may have never expected in the past are now the ones possibly being affected the most, and the outcome could not only be chaotic, but potentially ... contracted nationwide to provide encryption technology which will secure ... […]

  • SLAs and ITOps Modernization | @CloudExpo #AI #DX #DigitalTransformation
    on September 13, 2017 at 8:27 am

    Netflix provides a fascinating exercise in seeing how well team members can maintain service uptime during simulated chaotic incidents of downed virtual ... The company develops comprehensive data encryption security strategie... […]

  • Read an exclusive extract of Robert Langdon’s latest adventure in Dan Brown’s Origin
    on September 12, 2017 at 8:25 pm

    Some twenty years ago, young Eddie Kirsch had been one of Langdon’s first students at Harvard University — a mop-haired computer geek whose interest in codes had led him to Langdon’s freshman seminar: Codes, Ciphers ... the chaotic mass of shapes ... […]

  • Ransomware Issues Too Often Lost In The Shuffle: Part 1
    on September 11, 2017 at 9:19 am

    But despite strong planning and expert guidance, amid all the chaotic workflow of a ransomware response ... files may not be encrypted but just renamed to provide the illusion of encryption to cajole a ransom payment. A digital forensics expert can ... […]

  • Your questions, Part I | BSD Now 210
    on September 8, 2017 at 12:06 am

    In the case of Wi-Fi, the radio must be powered on, the access point detected, and the optional encryption layer (e.g. WPA ... Often, things look totally chaotic and unmanageable, until you start working on them. AJ: I barely manage. […]

via Google News and Bing News

Leave a Reply

%d bloggers like this: