Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers
Fast algorithms on quantum computers could easily break many widely used cryptosystems, necessitating more innovative solutions for digital security. In a recent study, a team of scientists designed a stream cipher consisting of three cryptographic primitives based on independent mathematical models of chaos. The resulting cryptographic approach is robust to attacks from large-scale quantum computers and can be implemented on low-cost computers, paving the way to secure digital communications in the post-quantum era.
While for most of us cryptographic systems are things that just run “under the hood,” they are an essential element in the world of digital communications. However, the upcoming rise of quantum computers could shake the field of cryptography to its core. Fast algorithms running on these machines could break some of the most widely used cryptosystems, rendering them vulnerable. Well aware of this looming threat, cryptography researchers worldwide are working on novel encryption methods that can withstand attacks from quantum computers.
Chaos theory is actively being studied as a basis for post-quantum era cryptosystems. In mathematics, chaos is a property of certain dynamic systems that makes them extremely sensitive to initial conditions. While technically deterministic (non-random), these systems evolve in such complex ways that predicting their long-term state with incomplete information is practically impossible, since even small rounding errors in the initial conditions yield diverging results. This unique characteristic of chaotic systems can be leveraged to produce highly secure cryptographic systems, as a team of researchers from Ritsumeikan University, Japan, showed in a recent study published in IEEE Transactions on Circuits and Systems I.
Led by Professor Takaya Miyano, the team developed an unprecedented stream cipher consisting of three cryptographic primitives based on independent mathematical models of chaos. The first primitive is a pseudorandom number generator based on the augmented Lorenz (AL) map. The pseudorandom numbers produced using this approach are used to create key streams for encrypting/decrypting messages, which take the stage in the second and perhaps most remarkable primitive—an innovative method for secret-key exchange. This novel strategy for exchanging secret keys specifying the AL map is based on the synchronization of two chaotic Lorenz oscillators, which can be independently and randomly initialized by the two communicating users, without either of them knowing the state of the other’s oscillator. To conceal the internal states of these oscillators, the communicating users (the sender and the receiver) mask the value of one of the variables of their oscillator by multiplying it with a locally generated random number. The masked value of the sender is then sent to receiver and vice-versa. After a short time, when these back-and-forth exchanges cause both oscillators to sync up almost perfectly to the same state in spite of the randomization of the variables, the users can mask and exchange secret keys and then locally unmask them with simple calculations.
Finally, the third primitive is a hash function based on the logistic map (a chaotic equation of motion), which allows the sender to send a hash value and, in turn, allows the receiver to ensure that the received secret key is correct, i.e., the chaotic oscillators were synchronized properly.
The researchers showed that a stream cipher assembled using these three primitives is extremely secure and resistant to statistical attacks and eavesdropping since it is mathematically impossible to synchronize their own oscillator to either the sender’s or the receiver’s ones. This is an unprecedented achievement, as Prof. Miyano states: “Most chaos-based cryptosystems can be broken by attacks using classical computers within a practically short time. In contrast, our methods, especially the one for secret-key exchange, appear to be robust against such attacks and, more importantly, even hard to break using quantum computers.”
In addition to its security, the proposed key exchange method is applicable to existing block ciphers, such as the widely used Advanced Encryption Standard (AES). Moreover, the researchers could implement their chaos-based stream cipher on the Raspberry Pi 4, a small-scale computer, using Python 3.8. They even used it to securely transmit a famous painting by Johannes Vermeer between Kusatsu and Sendai, two places in Japan 600 km apart. “The implementation and running costs of our cryptosystem are remarkably low compared with those of quantum cryptography,” highlights Prof. Miyano, “Our work thus provides a cryptographic approach that guarantees the privacy of daily communications between people all over the world in the post-quantum era.”
With such power of chaos-based cryptography, we may not have much to worry about the dark sides of quantum computing.
Original Article: The Power of Chao: A Robust and Low-Cost Cryptosystem for the Post-Quantum Era
More from: Ritsumeikan University
The Latest on: Post-quantum era cryptosystems
- Post-Quantum Cryptography Market forecast to 2028on March 20, 2023 at 5:45 pm
Mar 21, 2023 (The Expresswire) -- Global “Post-Quantum Cryptography Market” Size 2023 Key players Profiled in the Report are [IBM Research,Infineon,evolutionQ,Microsoft Research,Thales/Gemalto ...
- Cloudflare offers free post-quantum cryptography protection to customerson March 16, 2023 at 6:08 pm
Content delivery network provider Cloudflare Inc. today announced it will provide post-quantum cryptography for free by default to all customers to help secure their websites, application ...
- Quantum Computing Kills Encryptionon March 16, 2023 at 5:00 pm
It sounds a little bit sci-fi, but that’s exactly the scenario that cryptographers interested in post-quantum crypto are ... In particular, McEliece cryptosystems come out looking like a good ...
- Cloudflare Democratizes Post-Quantum Cryptography By Delivering It For Free, By Defaulton March 16, 2023 at 10:45 am
Already powering more than 99% of all websites that support NIST standard track post-quantum cryptography today ... to seamlessly migrate to the next era of cybersecurity standards–instantly ...
- Securing Cryptography in the Quantum Computing Eraon March 7, 2023 at 3:59 pm
That’s the premise of a DesignCon keynote session titled, “Post-Quantum Cryptography: The Next Decade of Cryptographic Hardware Design,” to take place on Tuesday, January 31, from 11:45 am to 12:30 pm ...
- Thales pioneers Post Quantum Cryptography with a successful world-first pilot on phone callson February 24, 2023 at 1:23 am
Thales, leader in advanced technologies, successfully experimented end-to-end encrypted phone calls, tested to be resilient in the Post Quantum era. The pilot was performed with the Thales ...
- Thales pioneers Post Quantum Cryptography with a successful world-first pilot on phone callson February 24, 2023 at 1:01 am
Thales, leader in advanced technologies, successfully experimented end-to-end encrypted phone calls, tested to be resilient in the Post Quantum era. The pilot was performed with the Thales ...
via Bing News
The Latest on: Post-quantum era cryptosystems
[google_news title=”” keyword=”post-quantum era cryptosystems” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
via Google News
Add Comment