Complex key generation with secured seed exchange for Vernam cipher in security applications

Author(s):  
Vijayalaxmi Manjunatha ◽  
Arjun Rao ◽  
Airani Khan
Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2597
Author(s):  
Saeed Abdolinezhad ◽  
Lukas Zimmermann ◽  
Axel Sikora

In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT security applications, such as cryptographic key generation and entity authentication. PUFs extract the uncontrollable production characteristics of different devices to generate unique fingerprints for security applications. When generating PUF-based secret keys, the reliability and entropy of the keys are vital factors. This study proposes a novel method for generating PUF-based keys from a set of measurements. Firstly, it formulates the group-based key generation problem as an optimization problem and solves it using integer linear programming (ILP), which guarantees finding the optimum solution. Then, a novel scheme for the extraction of keys from groups is proposed, which we call positioning syndrome coding (PSC). The use of ILP as well as the introduction of PSC facilitates the generation of high-entropy keys with low error correction costs. These new methods have been tested by applying them on the output of a capacitor network PUF. The results confirm the application of ILP and PSC in generating high-quality keys.


2018 ◽  
Vol 13 (1) ◽  
pp. 136
Author(s):  
Abdel Latif Abu Dalhoum

Digital audio scrambling is a process used in audio security applications. Scrambling of audio files breaks the correlation between adjacent samples in order to convert the original audio to an unintelligible format. Scrambling is used to protect the audio against wiretapping and illegal surveillance, in addition to being a step in security algorithms, such as watermarking and encryption algorithms. Cellular automata are models that are discrete in nature and depend on simple and local rules to achieve an interesting overall behavior. Two-dimensional cellular automata were previously proposed as a key generation mechanism to scramble audio files. The mechanism was built upon be researchers in the multimedia security field. This paper explores the use of one-dimensional cellular automata in audio scrambling, which simplifies the process as deploying two-dimensional cellular automata requires changing the dimension of the audio file and the one-dimensional cellular automata does not, additionally, elementary one-dimensional cellular automata requires less parameters to configure. The scrambling degree is used to evaluate the model effectiveness in breaking the correlation of adjacent samples. In the experiments, different parameters are taken into account including the cellular automata class, the iterations needed and the method used to calculate the cells at the boundary. Experiments show that the one-dimensional cellular automata are capable of scrambling the audio file without any dimensional change and the chaotic rules tested give the highest scrambling degree.


2013 ◽  
Vol 5 (1) ◽  
pp. 36-41
Author(s):  
R. Ganesh ◽  
◽  
Ch. Sandeep Reddy ◽  

Author(s):  
Yasuhiko IKEMATSU ◽  
Dung Hoang DUONG ◽  
Albrecht PETZOLDT ◽  
Tsuyoshi TAKAGI

Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


Sign in / Sign up

Export Citation Format

Share Document