Kyoto University demonstrates the strength of its new cipher
How do we know if the electronic keys we use in our devices are really secure?
While it is possible to rigorously test the strength of a cipher — a kind of digital data lock — there are rarely any definitive proofs of unbreakability. Ciphers are highly complex, and while they may ward off certain attacks, they might be vulnerable to others.
Now, in a series of papers published in IEEE Transactions on Information Forensics and Security and IEICE Nonlinear Theory and Its Applications, researchers from Kyoto University have definitively demonstrated the strength of a cipher which is based on principles of chaos theory.
The group’s Vector Stream Cipher — or VSC — this is the first example of a 128-bit key chaotic cipher with provable security.
“We first developed VSC in 2004 as a simple, fast cipher, and parts of it have already been utilized in the private sector,” explains Ken Umeno, leader of the study. “Many theoretical attacks in the past have failed to break it, but until now we hadn’t shown definitive proof of security.”
The researchers conducted a number of tests, such as a method to evaluate the lock’s randomness. Many ciphers rely on number sequences that appear to be random, but are actually generated through recurring relations that are vulnerable to being reproduced.
“Before evaluating the security of VSC with randomness tests, we found a way to make it significantly more reliable and sensitive,” continues Umeno. “We then continued this refinement during the actual investigation.”
The research highlights that VSC is not only secure, but structurally simple and low on memory usage compared with existing technology, making it useful for high-density data transmission applications such as in 5G mobile networks and 4K television broadcasts.
Umeno concludes, “Chaotic ciphers have been in use for about 30 years, but before this study we had not expected to find proof of security. We hope that our work will be studied widely and applied throughout our digital world.”
Learn more: Shh! Proven security for your secrets
The Latest on: Chaotic cipher
- Chaos-based Multimedia Encryption and Watermarking Schemeson November 19, 2019 at 7:05 am
Encryption based on chaos theory (for example logistic and tent maps) has several characteristics such as pseudo randomness, ergodicity and strong dependence on initial conditions etc. Due to highly ...
- Technology laws are deficient and politicians 'don't have forever' to get balance right, Clare O’Neil sayson November 18, 2019 at 4:00 pm
“It’s probably hard to understand, but our life in Canberra is extremely chaotic. We work very long hours and we are grappling with dozens of issues every day. “Raising big and unfamiliar policy ...
- Image Encryption and Steganography Using Chaotic Maps with a Double Key Protectionon September 7, 2019 at 4:10 pm
Thus in our study we have developed the image encryption algorithm based on the chaotic logistic map and cat map. For this, a secret key is used to determine initial conditions and the input to the ...
- From chaos comes encryptionon May 23, 2019 at 2:34 am
The research also found the encryption was extremely efficient and therefore a ... "Starting a business is also like a chaotic system, and I mean that literally – you can apply maths to the network, ...
- Encryption laws pass, but Labor's Nauru bill delayedon December 6, 2018 at 12:58 pm
The last parliamentary sitting of the year in Australia has turned out chaotic but eventually led to the passage of new encryption laws.
- Chaos Theory Strengthens Digital Lockson July 25, 2017 at 4:08 am
In this study, the group led by Professor Ken Umeno of Kyoto University released new data on its Vector Stream Cipher (VSC), the first example of a 128-bit key chaotic cipher with provable security.
- Researchers prove the security of the Vector Stream Cipheron July 17, 2017 at 2:33 am
The group's Vector Stream Cipher (VSC) is the first example of a 128-bit key chaotic cipher with provable security. "We first developed VSC in 2004 as a simple, fast cipher, and parts of it have ...
- Shh! Proven security for your secretson July 14, 2017 at 7:34 am
The group's Vector Stream Cipher -- or VSC -- this is the first example of a 128-bit key chaotic cipher with provable security ... Kyoto University. "Shh! Proven security for your secrets." ...
- Shh! Proven security for your secretson July 14, 2017 at 6:04 am
The group's Vector Stream Cipher -- or VSC -- this is the first example of a 128-bit key chaotic cipher with provable security. "We first developed VSC in 2004 as a simple, fast cipher, and parts of ...
- Quantum Chaotic Image Encryption with One Time Running Keyon April 30, 2017 at 11:53 pm
In the phase of key generation, running key related to plaintext is generated by cipher-text successively disturbing chaotic component. In the process of encryption, polynomial multiplication in ...
via Google News and Bing News