Kyoto University demonstrates the strength of its new cipher
How do we know if the electronic keys we use in our devices are really secure?
While it is possible to rigorously test the strength of a cipher — a kind of digital data lock — there are rarely any definitive proofs of unbreakability. Ciphers are highly complex, and while they may ward off certain attacks, they might be vulnerable to others.
Now, in a series of papers published in IEEE Transactions on Information Forensics and Security and IEICE Nonlinear Theory and Its Applications, researchers from Kyoto University have definitively demonstrated the strength of a cipher which is based on principles of chaos theory.
The group’s Vector Stream Cipher — or VSC — this is the first example of a 128-bit key chaotic cipher with provable security.
“We first developed VSC in 2004 as a simple, fast cipher, and parts of it have already been utilized in the private sector,” explains Ken Umeno, leader of the study. “Many theoretical attacks in the past have failed to break it, but until now we hadn’t shown definitive proof of security.”
The researchers conducted a number of tests, such as a method to evaluate the lock’s randomness. Many ciphers rely on number sequences that appear to be random, but are actually generated through recurring relations that are vulnerable to being reproduced.
“Before evaluating the security of VSC with randomness tests, we found a way to make it significantly more reliable and sensitive,” continues Umeno. “We then continued this refinement during the actual investigation.”
The research highlights that VSC is not only secure, but structurally simple and low on memory usage compared with existing technology, making it useful for high-density data transmission applications such as in 5G mobile networks and 4K television broadcasts.
Umeno concludes, “Chaotic ciphers have been in use for about 30 years, but before this study we had not expected to find proof of security. We hope that our work will be studied widely and applied throughout our digital world.”
Learn more: Shh! Proven security for your secrets
The Latest on: Chaotic cipher
- [Opinion] Baltimore County Public Schools Closed After Ransomware Attack on Computer Systemson November 30, 2020 at 3:00 pm
According to my friends with kids and my friend who teaches, distance learning is a less than ideal experience. It’s super impersonal, occasionally chaotic and unsurprisingly, super vulnerable to ...
- A Jamaican Thanksgiving with The Best Dressed Chickenon November 19, 2020 at 4:44 am
The quintessential North American feast takes on new relevance this year as the act of cooking and spreading a table serves to add some normalcy to the chaotic march the world has been in for the ...
- Encryption Key Management Marketon November 18, 2020 at 4:42 am
Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys. High-profile data misfortunes and administrative consistence ...
- Beowulf, but Make It #Relevant (and Bro)on November 16, 2020 at 11:21 am
I did the translation for every purpose at once—which is chaotic, but I’m chaotic ... You had to reduce the words, and it became a sort of encryption due to tedium. A lot of those words ...
- Introducing the diskAshur M2: iStorage's Ultra-Portable PIN Authenticated, Hardware Encrypted SSDon November 2, 2020 at 4:00 pm
LONDON, Nov. 03, 2020 (GLOBE NEWSWIRE) -- iStorage, the award-winning and trusted global leader of hardware encrypted data storage and cloud encryption devices, is proud to announce the launch of the ...
- Listen up! How to tune in to customers and turn down the noiseon October 27, 2020 at 5:08 am
Chaotic calendars and competing priorities inadvertently isolate many well-intentioned leaders from their customers and make it tempting to manage relationships by statistics rather than by stories.
- Jie Wangon March 15, 2020 at 1:25 am
His previous interests included large-scale network dynamics, cloud computing and search over encryption, network security, wireless networks, and computational complexity theory. He is particularly ...
- An Innovative Approach: Image Encryption with Chaotic Maps using DNA Addition Operationon September 4, 2019 at 5:36 pm
Encryption technology is an important measure to ensure the security of digital image; this paper's main purpose is to research how to encrypt images by chaos. In this paper, five chaotic maps are ...
- A Discrete Chaotic Encryption Algorithm Using Lorenz Attractoron October 26, 2014 at 9:05 pm
In this paper, a novel idea is proposed for a discrete chaotic data encryption/decryption algorithm using Lorentz attractors. The encryption system consists of a chaos generator, which takes the ...
via Google News and Bing News