Chaos-based Cryptography for Cloud Computing

被引:0
|
作者
Tobin, P. [1 ]
Tobin, L. [1 ]
Mc Keever, M. [1 ]
Blackledge, J. [1 ]
机构
[1] Dublin Inst Technol, Sch Elect & Elect Engn, Dublin, Ireland
关键词
Backdoors; one-time pads; chaos; natural noise; cryptography; Orcad PSpice; Von Neumann; NIST; COMMUNICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing and poor security issues have quadrupled over the last six years. The alleged presence of backdoors in common encryption ciphers and a system for addressing this problem, is discussed. In 2007, two Microsoft employees gave a presentation "On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators" which was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Security Agency. If true, it creates an urgent need for personalising the encryption process by generating locally, an unlimited number of the unbreakable one-time pad ciphers. Hybrid random binary sequences generated from chaotic oscillators initialised by natural noise, were exported to an online Javascript application. The online software uses a von Neumann deskewing algorithm to improve the cryptographic strength of the encryptor and also provides an initial statistical p-test for randomness. Encoding the Lenna image by XORing it with the new cipher provided another quick test to observe if any patterns are in the encoded image, otherwise the cipher is subjected to the NIST suite of statistical tests. All designs were simulated in Orcad PSpice(C) V16.5 prior to prototype construction.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Use of Cryptography in Cloud Computing
    Jaber, Aws Naser
    Bin Zolkipli, Mohamad Fadli
    2013 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE 2013), 2013, : 179 - 184
  • [32] CLOUD COMPUTING IN CRYPTOGRAPHY AND STEGANOGRAPHY
    Zadiraka, V. K.
    Kudin, A. M.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2013, 49 (04) : 584 - 588
  • [33] An Adaptive Control Approach to Securely Transmit Colored Images using Chaos-based Cryptography
    Zaher, Ashraf A.
    Yousafzai, Jibran
    2019 IEEE 62ND INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2019, : 953 - 956
  • [34] New Chaotic System: M-Map and Its Application in Chaos-Based Cryptography
    Lawnik, Marcin
    Berezowski, Marek
    SYMMETRY-BASEL, 2022, 14 (05):
  • [35] Chaos-Based Audio Steganography and Cryptography Using LSB Method and One-Time Pad
    Alwahbani, Samah M. H.
    Elshoush, Huwaida T. I.
    PROCEEDINGS OF SAI INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS) 2016, VOL 2, 2018, 16 : 755 - 768
  • [36] Cryptography and Data Security in Cloud Computing
    Yan, Zheng
    Deng, Robert H.
    Varadharajan, Vijay
    INFORMATION SCIENCES, 2017, 387 : 53 - 55
  • [37] New chaos-based computing technique evolves its answers - Very quickly
    Child, J
    ELECTRONIC DESIGN, 1998, 46 (26) : 29 - 30
  • [38] Secure sharing with cryptography in cloud computing
    Chachapara, Kajal
    Bhadlawala, Sunny
    2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [39] Chaos based image encryption security in cloud computing
    Kumar, Sarvesh
    Srivastava, Prabhat Kumar
    Srivastava, Gaurav Kumar
    Singhal, Prateek
    Singh, Dinesh
    Goyal, Dinesh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04): : 1041 - 1051
  • [40] Chaos-based cryptosystem on DSP
    Guglielmi, Veronique
    Pinel, Pierre
    Fournier-Prunaret, Daniele
    Taha, Abdel-Kaddous
    CHAOS SOLITONS & FRACTALS, 2009, 42 (04) : 2135 - 2144