scholarly journals Comparison of a Chaotic Cryptosystem with Other Cryptography Systems

2020 ◽  
Vol 10 (5) ◽  
pp. 6187-6190
Author(s):  
A. S. Alshammari

The keyspace of a cryptography system must be long enough in order to protect it from brute force attacks. The One-Time Pad (OTP) encryption is unconditionally secure because of its truly random keystream that is used only once. This paper proposes a new chaotic symmetric cryptosystem approach, comparable to OTP. The proposed system utilizes two Lorenz generators, a main and an auxiliary, where the aim of the second one is to make one of the main Lorenz generator’s parameters to vary continually with time in a chaotic manner. This technique was built on digitizing two Lorenz chaotic models to increase the security level. The scrambling scheme was developed and the Lorenz stream cipher binary stream successfully passed the NIST randomness test. The cryptosystem showed a high degree of security, as it had a keyspace of 2576, and it was compared with existing symmetric key cryptography systems, such as DES, 3DES, AES, Blowfish, and OTP.

2021 ◽  
Vol 11 (11) ◽  
pp. 4776
Author(s):  
Kyungbae Jang ◽  
Gyeongju Song ◽  
Hyunjun Kim ◽  
Hyeokdong Kwon ◽  
Hyunji Kim ◽  
...  

Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key cryptography can be lowered from n-bit to n2-bit. When applying Grover’s search algorithm to the block cipher that is the target of potential quantum attacks, the target block cipher must be implemented as quantum circuits. Starting with the AES block cipher, a number of works have been conducted to optimize and implement target block ciphers into quantum circuits. Recently, many studies have been published to implement lightweight block ciphers as quantum circuits. In this paper, we present optimal quantum circuit designs of symmetric key cryptography, including PRESENT and GIFT block ciphers. The proposed method optimized PRESENT and GIFT block ciphers by minimizing qubits, quantum gates, and circuit depth. We compare proposed PRESENT and GIFT quantum circuits with other results of lightweight block cipher implementations in quantum circuits. Finally, quantum resources of PRESENT and GIFT block ciphers required for the oracle of the Grover search algorithm were estimated.


2019 ◽  
Vol 37 (3) ◽  
pp. 31
Author(s):  
Raquel Fernández González ◽  
Marcos Íñigo Pérez Pérez

The return of institutions to the main research agenda has highlighted the importance of rules in economic analysis. The New Institutional Economics has allowed a better understanding of the case studies that concern different areas of knowledge, also the one concerning the management of natural resources. In this article, the institutional analysis focuses on the maritime domain, where two large civil liability regimes for pollution coexist (OPA 90-IMO), each in a different geographical area (United States - Europe). Therefore, a comparative analysis is made between the two large regimes of civil responsibility assignment applying them to the Prestige catastrophe. In this way, the allocation and distribution of responsibilities in the investigation and subsequent judicial process of the Prestige is compared with an alternative scenario in which the applicable compensation instruments are governed by the provisions of the Oil Polution Act of 1990 (OPA 90), in order to establish a rigorous analysis on the effects that the different norms can have in the same scenario. In the comparative established in the case of the Prestige, where the responsibilities were solved very slowly in a judicial process with high transaction costs, the application of rules governed by the OPA 90 would not count with such a high degree of imperfection. This is so, since by applying the preponderance of the evidence existing in OPA 90 there would be no mitigation for the presumed culprits. On the other hand, the agents involved in the sinking would not be limited only to the owner, but also that operators or shipowners would be responsible as well. In addition, the amount of compensation would increase when counting in the damage count the personal damages, the taxes without perceiving and the ecological damage caused in a broad sense, damages not computable in the IMO.


2019 ◽  
Author(s):  
Ira Nath ◽  
Renesha Ghosh ◽  
Sourav Ghosh ◽  
Pranati Rakshit ◽  
Dharmpal Singh

2019 ◽  
Author(s):  
Ira Nath ◽  
Pranati Rakshit ◽  
Renesha Ghosh ◽  
Sourav Ghosh ◽  
Dharmpal Singh

Symmetry ◽  
2018 ◽  
Vol 10 (12) ◽  
pp. 685
Author(s):  
Raylin Tso

With the developments of mobile communications, M-commerce has become increasingly popular in recent years. However, most M-commerce schemes ignore user anonymity during online transactions. As a result, user transactions may easily be traced by shops, banks or by Internet Service Providers (ISPs). To deal with this problem, we introduce a new anonymous mobile payment scheme in this paper. Our new scheme has the following features: (1) Password-based authentication: authentication of users is done by low-entropy password; (2) Convenience: the new scheme is designed based on near field communication (NFC)-enabled devices and is compatible with EuroPay, MasterCard and Visa (EMV-compatible); (3) Efficiency: users do not need to have their own public/private key pairs and confidentiality is achieved via symmetric-key cryptography; (4) Anonymity: users use virtual accounts in the online shopping processes, thereby preventing attackers from obtaining user information even if the transaction is eavesdropped; (5) Untraceablity: no one (even the bank, Trusted Service Manager (TSM), or the shop) can trace a transaction and link the real identity with the buyer of a transaction; (6) Confidentiality and authenticity: all the transaction is either encrypted or signed by the sender so our new scheme can provide confidentiality and authenticity. We also present the performance and the security comparison of our scheme with other schemes. The results show that our scheme is applicable and has the most remarkable features among the existing schemes.


Sign in / Sign up

Export Citation Format

Share Document