Jul 162017
 

Kyoto University demonstrates the security of a cipher based on chaos theory.
CREDIT
Kyoto Univeristy / Eiri Ono

Kyoto University demonstrates the strength of its new cipher

How do we know if the electronic keys we use in our devices are really secure?

While it is possible to rigorously test the strength of a cipher — a kind of digital data lock — there are rarely any definitive proofs of unbreakability. Ciphers are highly complex, and while they may ward off certain attacks, they might be vulnerable to others.

Now, in a series of papers published in IEEE Transactions on Information Forensics and Security and IEICE Nonlinear Theory and Its Applications, researchers from Kyoto University have definitively demonstrated the strength of a cipher which is based on principles of chaos theory.

The group’s Vector Stream Cipher — or VSC — this is the first example of a 128-bit key chaotic cipher with provable security.

“We first developed VSC in 2004 as a simple, fast cipher, and parts of it have already been utilized in the private sector,” explains Ken Umeno, leader of the study. “Many theoretical attacks in the past have failed to break it, but until now we hadn’t shown definitive proof of security.”

The researchers conducted a number of tests, such as a method to evaluate the lock’s randomness. Many ciphers rely on number sequences that appear to be random, but are actually generated through recurring relations that are vulnerable to being reproduced.

“Before evaluating the security of VSC with randomness tests, we found a way to make it significantly more reliable and sensitive,” continues Umeno. “We then continued this refinement during the actual investigation.”

The research highlights that VSC is not only secure, but structurally simple and low on memory usage compared with existing technology, making it useful for high-density data transmission applications such as in 5G mobile networks and 4K television broadcasts.

Umeno concludes, “Chaotic ciphers have been in use for about 30 years, but before this study we had not expected to find proof of security. We hope that our work will be studied widely and applied throughout our digital world.”

Learn more: Shh! Proven security for your secrets

 

The Latest on: Chaotic cipher
  • Nonlinear and Quantum Methods for Image Processing and Cryptography
    on November 17, 2017 at 1:39 am

    Furthermore, to explore the potential of the new method, a novel quantum image encryption method based on quantum chaotic Baker map and random phase mask is discussed. Supported by detailed numeric simulations and analysis, the new method provides a more ... […]

  • How a Wall of Lava Lamps Makes the Web a Safer Place
    on November 15, 2017 at 12:00 am

    Randomization is an essential part of every encryption service, but spitting out a meaningless ... to generate randomness (tools used by other Cloudflare offices include a "chaotic pendulum" and a radioactive source), but they may be the prettiest to ... […]

  • The role of good data protection in a post cyber world
    on November 14, 2017 at 4:58 am

    Historically, cyber-crime was unorganised and chaotic – the preserve of ‘script kids' in ... of policy-makers expressing open hostility towards the very concept of encryption, they risk losing any real meaning. This becomes doubly true when you factor ... […]

  • 'Mr. Robot': How Season 3's Craziest Episode Came to Life
    on November 9, 2017 at 11:30 am

    The episode takes a turn for the chaotic once the protest becomes violent ... (HSM), which is basically a computer that serves as a vault for sensitive data like encryption keys and digital certificates. If the Dark Army can gain access to the HSM ... […]

  • Carnage at small-town Texas church claimed 8 children
    on November 8, 2017 at 3:14 pm

    LA VERNIA, Texas (AP) - By the time Paul Brunner rolled up in his ambulance to the worst mass shooting in Texas history, the First Baptist Church was a chaotic triage scene ... The FBI claims encryption has stymied investigations of everything from ... […]

  • Watch a wall of lava lamps helping keep the internet secure
    on November 8, 2017 at 7:35 am

    For this project, the more chaotic and arbitrary the better ... code requires a system to mimic chaos. The best encryption has a truly random key so it’s more difficult for a bad actor to guess how to break the cipher. Cloudflare videotapes its wall ... […]

  • When You Can’t Rely on Code… How This Wall of Lava Lamps Secures the Internet By Being Unpredictably Real
    on November 7, 2017 at 8:31 am

    Cloudflare’s encryption secret? Meet the wall of lava lamps One of ... Whether this stream can be “truly” random or not, this solution sure seems more unpredictable and chaotic than relying on just software. And bonus points for keeping things ... […]

  • How Cloudflare uses lava lamps to encrypt the Internet
    on November 7, 2017 at 1:39 am

    Encryption is a hot topic today ... In the firm's London office, there is something called a "chaotic pendulum" which has three components that unpredictably twist and turn together, and in Singapore, the company uses a radioactive source. […]

  • A Discrete Chaotic Encryption Algorithm Using Lorenz Attractor
    on October 26, 2014 at 9:05 pm

    This communication of critical information over global computer network needs encrypting the digital information before transmitting through the network. In this paper, a novel idea is proposed for a discrete chaotic data encryption/decryption algorithm ... […]

  • Chaotic Communication
    on December 31, 2005 at 4:00 pm

    When the attractors are synchronized, they effectively become part of the same chaotic circuit. The receiver--let's call him Bob, using a convention from quantum encryption--sees the attractor evolve exactly as the transmitter--let's say, Alice--intends. […]

via Google News and Bing News

Leave a Reply

%d bloggers like this: