The power of chaos: A robust and low-cost cryptosystem for the post-
quantum era
Date:
February 1, 2022
Source:
Ritsumeikan University
Summary:
Scientists develop a chaos-based stream cipher that can withstand
attacks from large-scale quantum computers.
FULL STORY ==========================================================================
Fast algorithms on quantum computers could easily break many widely
used cryptosystems, necessitating more innovative solutions for digital security. In a recent study, a team of scientists designed a stream
cipher consisting of three cryptographic primitives based on independent mathematical models of chaos. The resulting cryptographic approach
is robust to attacks from large- scale quantum computers and can be
implemented on low-cost computers, paving the way to secure digital communications in the post-quantum era.
========================================================================== While for most of us cryptographic systems are things that just run
"under the hood," they are an essential element in the world of digital communications.
However, the upcoming rise of quantum computers could shake the field
of cryptography to its core. Fast algorithms running on these machines
could break some of the most widely used cryptosystems, rendering them vulnerable. Well aware of this looming threat, cryptography researchers worldwide are working on novel encryption methods that can withstand
attacks from quantum computers.
Chaos theory is actively being studied as a basis for post-quantum era cryptosystems. In mathematics, chaos is a property of certain dynamic
systems that makes them extremely sensitive to initial conditions. While technically deterministic (non-random), these systems evolve in such
complex ways that predicting their long-term state with incomplete
information is practically impossible, since even small rounding errors in
the initial conditions yield diverging results. This unique characteristic
of chaotic systems can be leveraged to produce highly secure cryptographic systems, as a team of researchers from Ritsumeikan University, Japan,
showed in a recent study published in IEEE Transactions on Circuits and
Systems I.
Led by Professor Takaya Miyano, the team developed an unprecedented
stream cipher consisting of three cryptographic primitives based
on independent mathematical models of chaos. The first primitive is
a pseudorandom number generator based on the augmented Lorenz (AL)
map. The pseudorandom numbers produced using this approach are used
to create key streams for encrypting/ decrypting messages, which take
the stage in the second and perhaps most remarkable primitive -- an
innovative method for secret-key exchange.
This novel strategy for exchanging secret keys specifying the AL map is
based on the synchronization of two chaotic Lorenz oscillators, which can
be independently and randomly initialized by the two communicating users, without either of them knowing the state of the other's oscillator. To
conceal the internal states of these oscillators, the communicating users
(the sender and the receiver) mask the value of one of the variables
of their oscillator by multiplying it with a locally generated random
number. The masked value of the sender is then sent to receiver and
vice-versa. After a short time, when these back-and-forth exchanges cause
both oscillators to sync up almost perfectly to the same state in spite
of the randomization of the variables, the users can mask and exchange
secret keys and then locally unmask them with simple calculations.
Finally, the third primitive is a hash function based on the logistic map
(a chaotic equation of motion), which allows the sender to send a hash
value and, in turn, allows the receiver to ensure that the received secret
key is correct, i.e., the chaotic oscillators were synchronized properly.
The researchers showed that a stream cipher assembled using these three primitives is extremely secure and resistant to statistical attacks and eavesdropping since it is mathematically impossible to synchronize their
own oscillator to either the sender's or the receiver's ones. This is
an unprecedented achievement, as Prof. Miyano states: "Most chaos-based cryptosystems can be broken by attacks using classical computers within a practically short time. In contrast, our methods, especially the one for secret-key exchange, appear to be robust against such attacks and, more importantly, even hard to break using quantum computers." In addition to
its security, the proposed key exchange method is applicable to existing
block ciphers, such as the widely used Advanced Encryption Standard
(AES). Moreover, the researchers could implement their chaos-based
stream cipher on the Raspberry Pi 4, a small-scale computer, using Python
3.8. They even used it to securely transmit a famous painting by Johannes Vermeer between Kusatsu and Sendai, two places in Japan 600 km apart. "The implementation and running costs of our cryptosystem are remarkably low compared with those of quantum cryptography," highlights Prof. Miyano,
"Our work thus provides a cryptographic approach that guarantees the
privacy of daily communications between people all over the world in
the post-quantum era." With such power of chaos-based cryptography,
we may not have much to worry about the dark sides of quantum computing.
========================================================================== Story Source: Materials provided by Ritsumeikan_University. Note:
Content may be edited for style and length.
========================================================================== Journal Reference:
1. Koshiro Onuki, Kenichiro Cho, Yoshihiko Horio, Takaya
Miyano. Secret-Key
Exchange Through Synchronization of Randomized Chaotic Oscillators
Aided by Logistic Hash Function. IEEE Transactions on Circuits and
Systems I: Regular Papers, 2022; 1 DOI: 10.1109/TCSI.2022.3140762 ==========================================================================
Link to news story:
https://www.sciencedaily.com/releases/2022/02/220201115235.htm
--- up 8 weeks, 3 days, 7 hours, 13 minutes
* Origin: -=> Castle Rock BBS <=- Now Husky HPT Powered! (1:317/3)