Kyoto University demonstrates the strength of its new cipher
How do we know if the electronic keys we use in our devices are really secure?
While it is possible to rigorously test the strength of a cipher — a kind of digital data lock — there are rarely any definitive proofs of unbreakability. Ciphers are highly complex, and while they may ward off certain attacks, they might be vulnerable to others.
Now, in a series of papers published in IEEE Transactions on Information Forensics and Security and IEICE Nonlinear Theory and Its Applications, researchers from Kyoto University have definitively demonstrated the strength of a cipher which is based on principles of chaos theory.
The group’s Vector Stream Cipher — or VSC — this is the first example of a 128-bit key chaotic cipher with provable security.
“We first developed VSC in 2004 as a simple, fast cipher, and parts of it have already been utilized in the private sector,” explains Ken Umeno, leader of the study. “Many theoretical attacks in the past have failed to break it, but until now we hadn’t shown definitive proof of security.”
The researchers conducted a number of tests, such as a method to evaluate the lock’s randomness. Many ciphers rely on number sequences that appear to be random, but are actually generated through recurring relations that are vulnerable to being reproduced.
“Before evaluating the security of VSC with randomness tests, we found a way to make it significantly more reliable and sensitive,” continues Umeno. “We then continued this refinement during the actual investigation.”
The research highlights that VSC is not only secure, but structurally simple and low on memory usage compared with existing technology, making it useful for high-density data transmission applications such as in 5G mobile networks and 4K television broadcasts.
Umeno concludes, “Chaotic ciphers have been in use for about 30 years, but before this study we had not expected to find proof of security. We hope that our work will be studied widely and applied throughout our digital world.”
Learn more: Shh! Proven security for your secrets
The Latest on: Chaotic cipher
- Skynet: The First Blockchain Chip on October 6, 2018 at 10:51 am
The core should deliver a decryption and encryption rate that is quicker than ... infinity-chain blockchain architecture that allows for chaotic subsystems and scalability in IoT devices. […]
- Scientists Across the Globe Are Hunting for Pure Randomness on October 6, 2018 at 6:23 am
While many things in nature appear chaotic, they almost always have underlying structures ... Security protocols, such as encryption of messages, also make frequent use of randomness, and these also n... […]
- Full Statement: UN Secretary General Assembly address 2018 on September 25, 2018 at 8:23 am
Today, world order is increasingly chaotic. Power relations are less clear ... Organized criminal networks lurk on the dark web, profiting from encryption and near-anonymous cryptocurrency payments to ... […]
- The Riemann Hypothesis: A 160-Year-Old, Million-Dollar Maths Problem on September 25, 2018 at 2:20 am
It would, in other words, tell us if prime numbers are as chaotic as they seem today ... is a commonly employed practice used in encryption techniques like public-key encryption systems. […]
- 10 hot hybrid-cloud startups to watch on September 18, 2018 at 1:09 pm
Data is shielded by several security protections, including encryption, masking and role-based access policies ... security and interoperability – to help enterprises control the often-chaotic shift t... […]
via Google News and Bing News