Chaos-based Cryptography for Cloud Computing

被引:0
|
作者
Tobin, P. [1 ]
Tobin, L. [1 ]
Mc Keever, M. [1 ]
Blackledge, J. [1 ]
机构
[1] Dublin Inst Technol, Sch Elect & Elect Engn, Dublin, Ireland
关键词
Backdoors; one-time pads; chaos; natural noise; cryptography; Orcad PSpice; Von Neumann; NIST; COMMUNICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing and poor security issues have quadrupled over the last six years. The alleged presence of backdoors in common encryption ciphers and a system for addressing this problem, is discussed. In 2007, two Microsoft employees gave a presentation "On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators" which was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Security Agency. If true, it creates an urgent need for personalising the encryption process by generating locally, an unlimited number of the unbreakable one-time pad ciphers. Hybrid random binary sequences generated from chaotic oscillators initialised by natural noise, were exported to an online Javascript application. The online software uses a von Neumann deskewing algorithm to improve the cryptographic strength of the encryptor and also provides an initial statistical p-test for randomness. Encoding the Lenna image by XORing it with the new cipher provided another quick test to observe if any patterns are in the encoded image, otherwise the cipher is subjected to the NIST suite of statistical tests. All designs were simulated in Orcad PSpice(C) V16.5 prior to prototype construction.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] FUNDAMENTALS OF A CLASSICAL CHAOS-BASED CRYPTOSYSTEM WITH SOME QUANTUM CRYPTOGRAPHY FEATURES
    Vidal, G.
    Baptista, M. S.
    Mancini, H.
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2012, 22 (10):
  • [22] Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
    Zaher, Ashraf A.
    Hussain, G. Amjad
    2019 7TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2019, : 241 - 246
  • [23] Medical image security using modified chaos-based cryptography approach
    Gatta, Methaq Talib
    Abd Al-latief, Shahad Thamear
    IBN AL-HAITHAM FIRST INTERNATIONAL SCIENTIFIC CONFERENCE, 2018, 1003
  • [24] Cryptanalysis of a Classical Chaos-Based Cryptosystem with Some Quantum Cryptography Features
    Arroyo, David
    Hernandez, Fernando
    Orue, Amalia B.
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2017, 27 (01):
  • [25] Cryptography in Cloud Computing
    Deng, Robert H.
    Xiang, Yang
    Au, Man Ho
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2014, 30 : 90 - 90
  • [26] New Enrollment Scheme for Biometric Template using Hash Chaos-Based Cryptography
    Mihailescu, Marius Iulian
    24TH DAAAM INTERNATIONAL SYMPOSIUM ON INTELLIGENT MANUFACTURING AND AUTOMATION, 2013, 2014, 69 : 1459 - 1468
  • [27] An Effective Approach to Scramble Multiple Diagnostic Imageries Using Chaos-Based Cryptography
    Sanaboina, Chandra Sekhar
    Yadla, Tejaswini
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2022, 13 (04): : 851 - 861
  • [29] Designing of Cryptography Based Security System for Cloud Computing
    Sengupta, Nandita
    Holmes, Jeffrey
    2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 52 - 57
  • [30] Threshold Cryptography Based Data Security in Cloud Computing
    Saroj, Sushil Kr
    Chauhan, Sanjeev Kr
    Sharma, Aravendra Kr
    Vats, Sundaram
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207