Quantum Resistance for Cryptographic Keys in Classical Cryptosystems: A Study on QKD Protocols

Author(s):  
Tinku Adhikari ◽  
Arindam Ghosh ◽  
Ajoy Kumar Khan ◽  
Swarnalina Laha ◽  
Purbita Mitra ◽  
...  
Keyword(s):  
Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 8
Author(s):  
Bertrand Cambou ◽  
Donald Telesca ◽  
Sareh Assiri ◽  
Michael Garrett ◽  
Saloni Jain ◽  
...  

Schemes generating cryptographic keys from arrays of pre-formed Resistive Random Access (ReRAM) cells, called memristors, can also be used for the design of fast true random number generators (TRNG’s) of exceptional quality, while consuming low levels of electric power. Natural randomness is formed in the large stochastic cell-to-cell variations in resistance values at low injected currents in the pre-formed range. The proposed TRNG scheme can be designed with three interconnected blocks: (i) a pseudo-random number generator that acts as an extended output function to generate a stream of addresses pointing randomly at the array of ReRAM cells; (ii) a method to read the resistance values of these cells with a low injected current, and to convert the values into a stream of random bits; and, if needed, (iii) a method to further enhance the randomness of this stream such as mathematical, Boolean, and cryptographic algorithms. The natural stochastic properties of the ReRAM cells in the pre-forming range, at low currents, have been analyzed and demonstrated by measuring a statistically significant number of cells. Various implementations of the TRNGs with ReRAM arrays are presented in this paper.


Science News ◽  
1995 ◽  
Vol 148 (25) ◽  
pp. 406
Author(s):  
I. Peterson

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Christoph Wronka

Purpose The aim of this paper is to assess the relevance of cryptocurrencies with regard to the money laundering risk on the market and to present widespread money laundering techniques and recognizable patterns of abuse. In addition, this paper aims to find an answer to the question to what extent the measures of the fifth EU Anti-Money Laundering Directive (AMLD) as well as other appropriate preventive measures are sufficient to reduce the money laundering risk in the area of virtual currencies (VC). Design/methodology/approach Firstly, the analysis requires a consideration of the theoretical foundations of money laundering methods, as well as a presentation of the technical foundations of cryptocurrencies and their ecosystem. Secondly, it is discussed to what extent VC are suitable for money laundering, which characteristics enable them to launder money and which new money laundering techniques result from this. In addition, a comparison of different money laundering risk classification is done in relation to VC from the perspective of different actors in the financial market. Findings Owing to their simple electronic storage and transferability, crypto assets pose a concrete risk of money laundering. Their inclusion in the fifth AMLD was therefore a necessary step by the European legislator. However, the question arises to whether the directive and the further preventive measures presented in this paper sufficiently fulfil the objective of reducing the money laundering risk in relation to VC. One positive aspect is the inclusion of the crypto custody business as a financial service in the German Banking Act. According to the definition in Section 1 (1a) sentence 2 no. 6, the offering of wallets is subject to authorization and the offering party becomes an obligated party within the meaning of the Germany Money Laundering Act. From a supervisory point of view, the new licensing requirement is very much welcomed, as the custody of private cryptographic keys entails considerable risks. However, non-custodian wallet providers who do not store the private keys of their users, are not covered. A closer analysis of the amending directive to the fourth EU AMLD reveals that other relevant players in the crypto market, such as mixer and tumbler services, are also not covered. Originality/value It is quite clear that cryptocurrencies and the blockchain technology will continue to accompany one in the coming years. Further credit institutions arising in the market exposed to the described risks will be seen. The paper will therefore present and evaluate possible risk reduction/options for anti-money laundering for new and existing financial institutions.


2009 ◽  
Vol 6 ◽  
pp. S132-S140 ◽  
Author(s):  
Carsten Maartmann-Moe ◽  
Steffen E. Thorkildsen ◽  
André Årnes

Offering efficient key management scheme (KMS) in WSN faces many challenges that will significantly impact the design and implementation of security protocols for WSN. The goal of KMS is to provide an effective environment in which the sensor node can communicate in a secure manner. It should be able to resolve the issue of generate, allocate the cryptographic keys in WSN in an efficient and effective manner. Hence, the methods for trustworthy allocation and management of these keys are very important for security of WSN. Many KMSs have been developed in recent years. However inherent characteristics of a WSN make incorporating security a great challenge. This paper presents a comprehensive review of current state-of-the-art of KMS designed for WSN security and compare with respect to several evaluation metrics. This paper also investigates the security requirements, goals and challenges of KMS based on existing literature reviews. We also attempt to provide insight in to potential research trends in the area of WSN security and outline the approaches that are likely to play a very important role.


A novel method to generate ECG feature oriented cryptographic keys is proposed. Due to the advantage of the uniqueness and randomness properties of ECG’s main feature, this feature is achieved. As the production of key depends on four reference- free ECG main features, Low-latency property is obtained. These features are obtained in short time. This process is referred as (SEF)-based cryptographic key production. The SEF has the following features like: 1) identifying the appearance time of ECG’s fiducial values by means of Daubechies wavelet transform to calculate ECG’s main features conversely; 2) A dynamic method is used to denote the best quantity of bits that can be obtained from the main ECG feature, which consists of PR, RR, PP, QT, and ST time periods; 3) Generating cryptographic keys by the ECG features extracted in the method mentioned above and 4) Making the SEF method as strong with cryptographically secure pseudo-random number generators. Fibonacci linear feedback shift register and recent encryption traditional algorithms are executed as the pseudorandom number generator to improve the safety stage of the produced cryptographic keys. This method is executed to 239 subjects’ ECG signals consisting of normal sinus rhythm, arrhythmia, atrial brillation, and myocardial infraction. Normal ECG rhythms have slightly better randomness when compare with the abnormal.The output results proves that the SEF method is faster than the present existing key production methods. It produces higher security level when compared to existing methods


Author(s):  
Ileana Buhan ◽  
Jeroen Doumen ◽  
Pieter Hartel ◽  
Qiang Tang ◽  
Raymond Veldhuis

Sign in / Sign up

Export Citation Format

Share Document