Jul 162017

Kyoto University demonstrates the security of a cipher based on chaos theory.
Kyoto Univeristy / Eiri Ono

Kyoto University demonstrates the strength of its new cipher

How do we know if the electronic keys we use in our devices are really secure?

While it is possible to rigorously test the strength of a cipher — a kind of digital data lock — there are rarely any definitive proofs of unbreakability. Ciphers are highly complex, and while they may ward off certain attacks, they might be vulnerable to others.

Now, in a series of papers published in IEEE Transactions on Information Forensics and Security and IEICE Nonlinear Theory and Its Applications, researchers from Kyoto University have definitively demonstrated the strength of a cipher which is based on principles of chaos theory.

The group’s Vector Stream Cipher — or VSC — this is the first example of a 128-bit key chaotic cipher with provable security.

“We first developed VSC in 2004 as a simple, fast cipher, and parts of it have already been utilized in the private sector,” explains Ken Umeno, leader of the study. “Many theoretical attacks in the past have failed to break it, but until now we hadn’t shown definitive proof of security.”

The researchers conducted a number of tests, such as a method to evaluate the lock’s randomness. Many ciphers rely on number sequences that appear to be random, but are actually generated through recurring relations that are vulnerable to being reproduced.

“Before evaluating the security of VSC with randomness tests, we found a way to make it significantly more reliable and sensitive,” continues Umeno. “We then continued this refinement during the actual investigation.”

The research highlights that VSC is not only secure, but structurally simple and low on memory usage compared with existing technology, making it useful for high-density data transmission applications such as in 5G mobile networks and 4K television broadcasts.

Umeno concludes, “Chaotic ciphers have been in use for about 30 years, but before this study we had not expected to find proof of security. We hope that our work will be studied widely and applied throughout our digital world.”

Learn more: Shh! Proven security for your secrets


The Latest on: Chaotic cipher
  • 10 resolutions IT professionals should keep all year
    on January 15, 2018 at 5:42 am

    This helps me to keep from feeling agitated when something isn't working right to see myself as a maintaining order in a chaotic environment. I also enjoy working with encryption since it can be rewarding when it works right, and as I indicated earlier ... […]

  • Trump book's accuracy at issue
    on January 7, 2018 at 6:24 pm

    His White House is described as disorganized, filled with infighting and at times chaotic. "Reigning over all of this was Trump, enigma, cipher and disruptor. How to get along with Trump -- who veered between a kind of blissed-out pleasure of being in the ... […]

  • Tommy Flowers: The Man Who Built Colossus
    on January 7, 2018 at 6:07 pm

    This high-level German cipher was generated by a teletypewriter in-line cipher ... The colliding electrons and atoms and the path taken by these particles within the tube tend to be very chaotic. This allows for a random current component leaving the ... […]

  • The Best Things We Watched In 2017
    on December 26, 2017 at 4:08 pm

    Whether it’s a cipher for the noise of the modern world ... would look like if it chose not to fill a home with the most swole, self-dramatizing and Chaotic Evil people imaginable, but instead with people who were mild-mannered, respectful of others ... […]

  • Chaotic Communication
    on December 31, 2005 at 4:00 pm

    The receiver--let's call him Bob, using a convention from quantum encryption--sees the attractor evolve ... But why bother with chaotic communication when the telecommunications industry manages perfectly well with conventional systems? […]

via Google News and Bing News

Leave a Reply

%d bloggers like this: