Kyoto University demonstrates the security of a cipher based on chaos theory.
CREDIT
Kyoto Univeristy / Eiri Ono
Kyoto University demonstrates the strength of its new cipher
How do we know if the electronic keys we use in our devices are really secure?
While it is possible to rigorously test the strength of a cipher — a kind of digital data lock — there are rarely any definitive proofs of unbreakability. Ciphers are highly complex, and while they may ward off certain attacks, they might be vulnerable to others.
Now, in a series of papers published in IEEE Transactions on Information Forensics and Security and IEICE Nonlinear Theory and Its Applications, researchers from Kyoto University have definitively demonstrated the strength of a cipher which is based on principles of chaos theory.
The group’s Vector Stream Cipher — or VSC — this is the first example of a 128-bit key chaotic cipher with provable security.
“We first developed VSC in 2004 as a simple, fast cipher, and parts of it have already been utilized in the private sector,” explains Ken Umeno, leader of the study. “Many theoretical attacks in the past have failed to break it, but until now we hadn’t shown definitive proof of security.”
The researchers conducted a number of tests, such as a method to evaluate the lock’s randomness. Many ciphers rely on number sequences that appear to be random, but are actually generated through recurring relations that are vulnerable to being reproduced.
“Before evaluating the security of VSC with randomness tests, we found a way to make it significantly more reliable and sensitive,” continues Umeno. “We then continued this refinement during the actual investigation.”
The research highlights that VSC is not only secure, but structurally simple and low on memory usage compared with existing technology, making it useful for high-density data transmission applications such as in 5G mobile networks and 4K television broadcasts.
Umeno concludes, “Chaotic ciphers have been in use for about 30 years, but before this study we had not expected to find proof of security. We hope that our work will be studied widely and applied throughout our digital world.”
Learn more:Â Shh! Proven security for your secrets
The Latest on:Â Chaotic cipher
- Hack Post-Quantum Cryptography Now So That Bad Actors Don’t Do It Lateron July 28, 2022 at 8:33 am
The U.S. government should consider offering a public cash bounty to anyone who can crack the new forms of encryption that are being rolled out to defend against quantum computers.
- Why educational institutions are an easy target for ransomware attackson July 25, 2022 at 3:12 pm
The ‘State of Ransomware in Education 2022’ report notes that educational institutions faced the highest data encryption rate (73%) compared to other sectors (65%), and the longest recovery ...
- Positive Trauma: Editor Mathilde Bonnefoy on CITIZENFOURon July 13, 2022 at 5:00 pm
Encryption basically works as a capsule that you create around ... I would say there’s something chaotic about the work with Laura that I discovered with utmost interest and pleasure, which is that we ...
- The female code breakers who helped defeat the Nazison July 12, 2022 at 5:00 pm
And so, in the intense and chaotic atmosphere of wartime America ... And in the all-important Atlantic theater, U.S. and British penetration of the Nazi Enigma cipher that German Admiral Karl Donitz ...
- U.S. Government and QuSecure Orchestrate First-Ever Post-Quantum Encryption Communication over a Government Networkon July 12, 2022 at 5:42 am
The quantum-resilient deployment has 100-percent uptime protecting data that previously used standard encryption, with no increased bandwidth or latency issues through QuProtect’s quantum tunnel.
- Inside the U.S. Government’s Fight Against Quantum Hackers — Which Don’t Exist yeton July 8, 2022 at 5:22 pm
This week, the National Institute of Standards and Technology (NIST) announced the winners of a global competition to create new encryption standards. Somewhat mind-bogglingly, these algorithms ...
- Google's BigQuery Introduces Column-Level Encryption Functions and Dynamic Masking of Informationon July 7, 2022 at 10:29 am
Design processes may be more complex, dispersed and chaotic than they should be ... data warehouse BigQuery which include column level encryption functions and dynamic masking of information.
- Sundown review: Tim Roth is a wealthy tourist adrift in a sea of luxury and violence in Mexico's Acapulcoon July 5, 2022 at 11:45 am
In Roberto Bolaño's 1997 short story Last Evenings on Earth, the narrator – a cipher for the acclaimed Chilean author himself – travels with his father to Acapulco. It is a road tale of sorts ...
- This Week in Apps: Period tracking app privacy, Snapchat's paid subscription, calls for TikTok banon July 2, 2022 at 12:29 pm
And after it rolled out its expected encryption later in the week ... indicating pent-up travel demand and possibly a desire to avoid the chaotic airline issues. New installs are projected to increase ...
- Messy Urbanism: Understanding the “Other" Cities of Asiaon October 23, 2020 at 2:09 am
Seemingly messy and chaotic, the landscapes and urban life of cities in Asia ... Chapter 4 Concrete Jungle or Geocultural Cipher? Reading Lineage into the Perils and Prospects of Metro Manila Chapter ...
via Google News and Bing News