Chaos-based Cryptography for Cloud Computing

被引:0
|
作者
Tobin, P. [1 ]
Tobin, L. [1 ]
Mc Keever, M. [1 ]
Blackledge, J. [1 ]
机构
[1] Dublin Inst Technol, Sch Elect & Elect Engn, Dublin, Ireland
关键词
Backdoors; one-time pads; chaos; natural noise; cryptography; Orcad PSpice; Von Neumann; NIST; COMMUNICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing and poor security issues have quadrupled over the last six years. The alleged presence of backdoors in common encryption ciphers and a system for addressing this problem, is discussed. In 2007, two Microsoft employees gave a presentation "On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators" which was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Security Agency. If true, it creates an urgent need for personalising the encryption process by generating locally, an unlimited number of the unbreakable one-time pad ciphers. Hybrid random binary sequences generated from chaotic oscillators initialised by natural noise, were exported to an online Javascript application. The online software uses a von Neumann deskewing algorithm to improve the cryptographic strength of the encryptor and also provides an initial statistical p-test for randomness. Encoding the Lenna image by XORing it with the new cipher provided another quick test to observe if any patterns are in the encoded image, otherwise the cipher is subjected to the NIST suite of statistical tests. All designs were simulated in Orcad PSpice(C) V16.5 prior to prototype construction.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Survey of Chaos-based Cryptography
    Zhen, Ping
    Zhao, Geng
    Min, Lequan
    Li, Xiaodong
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 237 - 244
  • [2] Chaos-based Cryptography for Color Images
    Cangea, Otilia
    Paraschiv, Nicolae
    2018 22ND INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2018, : 510 - 515
  • [3] Embedding Compression in Chaos-Based Cryptography
    Wong, Kwok-Wo
    Yuen, Ching-Hung
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2008, 55 (11) : 1193 - 1197
  • [4] Hardware Trojans detection in chaos-based cryptography
    Melosik, M.
    Sniatala, P.
    Marszalek, W.
    BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES, 2017, 65 (05) : 725 - 732
  • [5] Chaos-based Cryptography Using an Underactuated Synchronizer
    Gularte, Kevin H. M.
    Gomez, Juan C. G.
    Vargas, Jose A. R.
    dos Santos, Rogerio R.
    2021 14TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRY APPLICATIONS (INDUSCON), 2021, : 1303 - 1308
  • [6] A reliable chaos-based cryptography using Galois field
    Nardo, Lucas G.
    Nepomuceno, Erivelton G.
    Bastos, Gustavo T.
    Santos, Thiago A.
    Butusov, Denis N.
    Arias-Garcia, Janier
    CHAOS, 2021, 31 (09)
  • [7] Utilizing true periodic orbits in chaos-based cryptography
    Ozturk, Ismail
    Kilic, Recai
    NONLINEAR DYNAMICS, 2021, 103 (03) : 2805 - 2818
  • [8] Mayfly optimization with chaos-based image encryption technique for cloud computing environment
    Justin, Sheela
    Karuppusamy, Sathesh Kumar
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (05)
  • [9] Embedding adaptive arithmetic coder in chaos-based cryptography
    Li Heng-Jian
    Zhang Jia-Shu
    CHINESE PHYSICS B, 2010, 19 (05) : 0505018 - 0505089
  • [10] A BASIC FRAMEWORK FOR THE CRYPTANALYSIS OF DIGITAL CHAOS-BASED CRYPTOGRAPHY
    Arroyo, David
    Alvarez, Gonzalo
    Fernandez, Veronica
    2009 6TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES, VOLS 1 AND 2, 2009, : 58 - 63