New Class of Ciphers Using Hardware Entropy Source
- URL: http://arxiv.org/abs/2404.09288v1
- Date: Sun, 14 Apr 2024 15:44:50 GMT
- Title: New Class of Ciphers Using Hardware Entropy Source
- Authors: Jan J. Tatarkiewicz, Wieslaw B. Kuzmicz,
- Abstract summary: A stream of random bits is produced by extracting the entropy of a physical process.
The process of placing bits of a message into the stream of random bits is governed by the number of random bits skipped between subsequent insertions.
We propose an effective method of computing random keys from a given number of random bits.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We present a novel, computationally simple method of hiding any message in the stream of random bits by using a secret key. The method is called Bury Among Random Numbers (BARN). A stream of random bits is produced by extracting the entropy of a physical process in a hardware-based true random number generator (TRNG). The process of placing bits of a message into the stream of random bits is governed by the number of random bits skipped between subsequent insertions. The set of numbers that correspond to the steps of BARN is derived from a random number also provided by TRNG. Hence BARN cipher does not depend on any arithmetic function. We propose an effective method of computing random keys from a given number of random bits. We estimate the number of permutations that need to be tested during a brute-force attack on the new cipher for various key lengths. Some practical applications for the new class of symmetrical ciphers are discussed.
Related papers
- Correcting Subverted Random Oracles [55.4766447972367]
We prove that a simple construction can transform a "subverted" random oracle which disagrees with the original one at a small fraction of inputs into an object that is indifferentiable from a random function.
Our results permit future designers of cryptographic primitives in typical kleptographic settings to use random oracles as a trusted black box.
arXiv Detail & Related papers (2024-04-15T04:01:50Z) - Data Analysis Methods Preliminaries for a Photon-based Hardware Random Number Generator [39.58317527488534]
Minecraft is great for games, but not so great for cybersecurity encryption key generation.
PRNGs generate random numbers by quantifying some unpredictable phenomena into a number or string and feeding it into an algorithm.
By using a hardware random number generator (HRNG), random numbers that are not susceptible to the flaws found in PRNGs can be attained at a high rate.
arXiv Detail & Related papers (2024-04-15T00:47:17Z) - Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations [49.1574468325115]
Sponge hashing is a widely used class of cryptographic hash algorithms.
Intrepid permutations have so far remained a fundamental open problem.
We show that finding zero-pairs in a random $2n$-bit permutation requires at least $Omega (2n/2)$ many queries.
arXiv Detail & Related papers (2024-03-07T18:46:58Z) - Non Deterministic Pseudorandom Generator for Quantum Key Distribution [0.0]
Quantum Key Distribution thrives to achieve perfect secrecy of One time Pad (OTP) through quantum processes.
One of the crucial components of QKD are Quantum Random Number Generators(QRNG) for generation of keys.
This paper proposes a pseudorandom generator based on post quantum primitives.
arXiv Detail & Related papers (2023-11-06T11:03:03Z) - EntropyRank: Unsupervised Keyphrase Extraction via Side-Information
Optimization for Language Model-based Text Compression [62.261476176242724]
We propose an unsupervised method to extract keywords and keyphrases from texts based on a pre-trained language model (LM) and Shannon's information.
Specifically, our method extracts phrases having the highest conditional entropy under the LM.
arXiv Detail & Related papers (2023-08-25T14:23:40Z) - A privacy-preserving publicly verifiable quantum random number generator [48.7576911714538]
We report the implementation of an entanglement-based protocol that allows a third party to publicly perform statistical tests without compromising the privacy of the random bits.
limitations on computing power can restrict an end-user's ability to perform such verification.
arXiv Detail & Related papers (2023-05-18T12:13:48Z) - Testing randomness of series generated in Bell's experiment [62.997667081978825]
We use a toy fiber optic based setup to generate binary series, and evaluate their level of randomness according to Ville principle.
Series are tested with a battery of standard statistical indicators, Hurst, Kolmogorov complexity, minimum entropy, Takensarity dimension of embedding, and Augmented Dickey Fuller and Kwiatkowski Phillips Schmidt Shin to check station exponent.
The level of randomness of series obtained by applying Toeplitz extractor to rejected series is found to be indistinguishable from the level of non-rejected raw ones.
arXiv Detail & Related papers (2022-08-31T17:39:29Z) - Generation of 1 Gb full entropy random numbers with the enhanced-NRBG
method [0.13124513975412253]
Experimental demonstration of a non-deterministic random bit generator from a quantum entropy source and a deterministic random bit generator mechanism.
The extracted raw random numbers are further post-processed to generate a high-entropy seed for the hash based deterministic random bit generator.
arXiv Detail & Related papers (2021-08-09T20:06:43Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z) - Scalable quantum random number generator for cryptography based on the
random flip-flop approach [1.2578844450585998]
We present a quantum random number generator (QRNG) which makes use of a photoelectric effect in single-photon avalanche diodes (SPADs) as a source of randomness.
For the first time we investigate this method in detail and find that, out of two main imperfections, bias is due only to hardware imperfections.
arXiv Detail & Related papers (2021-02-24T11:00:22Z) - Randomness Concerns When Deploying Differential Privacy [0.25889737226898435]
The U.S. Census Bureau is using differential privacy to protect confidential respondent data collected for the 2020 Decennial Census of Population & Housing.
The Census Bureau's DP system is implemented in the Disclosure Avoidance System (DAS) and requires a source of random numbers.
We estimate that the 2020 Census will require roughly 90TB of random bytes to protect the person and household tables.
arXiv Detail & Related papers (2020-09-06T15:28:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.