8 research outputs found

    Estudio de mapeos caóticos discretos y su aplicación en criptografía

    Get PDF
    "La seguridad de la información digital cada vez tiene más auge, debido al creciente uso de dispositivos móviles, además del incremento de operaciones realizadas a través de internet. Esto representa un gran reto ya que para lograr la confidencialidad, integridad y autentificación es necesario el uso de mecanismos especializados, una forma de proporcionar estos servicios es por medio de la criptografía, sin embargo, la creciente demanda requiere de nuevos algoritmos que sean más rápidos y a su vez más seguros. Una opción para lograr estos objetivos es la criptografía basada en sistemas caóticos. Este trabajo de tesis se presenta en tres partes, en la primera parte se muestran los conceptos y definiciones básicas de las ¿áreas de criptografía y sistemas dinámicos, así como las herramientas que se tienen para estudiar cada uno de estos sistemas. Además se da una visión general de estas áreas así como una clasificación, de tal forma que nos enfocaremos en cifrados en flujo y en sistemas dinámicos de tiempo discreto. Cabe señalar que los sistemas dinámicos estudiados en este trabajo a diferencia del mapeo logístico y casa de campaña son multi-modales, los cuales presentan ciertas ventajas en comparación con los mapeos uni-modales. Posteriormente se analizan las similitudes y diferencias que se encuentran en estas dos áreas, dando lugar a la criptografía caótica, la cual ha sido objeto de estudio por diversos grupos de investigación en los últimos años. En la segunda parte de este trabajo se proponen metodologías para construir dos generadores pseudo-aleatorios, los cuales son la parte fundamental en el uso de cifrados en flujo, por un lado se propone el uso de valores positivos y negativos en el parámetro de bifurcación del mapeo logístico en conjunto con retardos, de esta forma es posible construir un generador que muestra resultados satisfactorios a las pruebas estadísticas de aleatoriedad propuestas por el NIST y además no es posible reconstruir el espacio fase. Por otro lado se presenta un generador basado en mapeos multi-modales el cual obtiene una secuencia binaria por medio de la combinación de diferentes modas, la principal ventaja radica en que solo es necesario definir un mapeo para obtener diferentes comportamientos, de igual forma este generador presenta resultados satisfactorios al ser evaluado por las pruebas estadísticas propuestas por el NIST.""The security of digital information is increasingly due to increasing use of mobile devices, in addition to the increase in transactions conducted via Internet. This represents a great challenge in order to achieve confidentiality, integrity and authentication is necessary use specialized mechanisms, a way of providing these services is through cryptography, however, the growing demand requires new algorithms that are faster and safe. One option to achieve these goals is chaos based cryptography. This thesis is presented in three parts, in the first part the basic concepts and definitions of the cryptography and dynamic systems as well as the tools to study each of these systems are shown. Furthermore an overview of these areas and a classification is given, we will focus on stream ciphers and discrete time dynamical systems. Note that the dynamical systems studied in this work unlike the logistic and tent map are multimodal, which have certain advantages compared with uni-modal maps. Afterwards the similarities and differences found in these two areas are analyzed, resulting in chaotic cryptography, which has been studied by several research groups in recent years. In the second part of this work we construct two pseudo-random generators, which are an essential part in the use of stream ciphers, in one hand we propose use positive and negative values in the bifurcation parameter of the logistic map together with delays, in this way it is possible to build a generator showing satisfactory results to statistical tests of randomness proposed by the NIST and it is not possible to reconstruct the phase space. On the other hand we present a generator based on multi-modal maps which produce a binary sequence obtained by combining different modal, the main advantage is that it is only necessary to define one map for different behaviors, similarly this generator presents satisfactory results when is evaluated by statistical tests proposed by the NIST.

    Data security in photonic information systems using quantum based approaches

    Get PDF
    The last two decades has seen a revolution in how information is stored and transmitted across the world. In this digital age, it is vital for banking systems, governments and businesses that this information can be transmitted to authorised receivers quickly and efficiently. Current classical cryptosystems rely on the computational difficulty of calculating certain mathematical functions but with the advent of quantum computers, implementing efficient quantum algorithms, these systems could be rendered insecure overnight. Quantum mechanics thankfully also provides the solution, in which information is transmitted on single-photons called qubits and any attempt by an adversary to gain information on these qubits is limited by the laws of quantum mechanics. This thesis looks at three distinct different quantum information experiments. Two of the systems describe the implementation of distributing quantum keys, in which the presence of an eavesdropper introduces unavoidable errors by the laws of quantum mechanics. The first scheme used a quantum dot in a micropillar cavity as a singlephoton source. A polarisation encoding scheme was used for implementing the BB84, quantum cryptographic protocol, which operated at a wavelength of 905 nm and a clock frequency of 40 MHz. A second system implemented phase encoding using asymmetric unbalanced Mach-Zehnder interferometers, with a weak coherent source, operating at a wavelength of 850 nm and pulsed at a clock rate of 1 GHz. The system used depolarised light propagating in the fibre quantum channel. This helps to eliminate the random evolution of the state of polarisation of photons, as a result of stress induced changes in the intrinsic birefringence of the fibre. The system operated completely autonomously, using custom software to compensate for path length fluctuations in the arms of the interferometer and used a variety of different single-photon detector technologies. The final quantum information scheme looked at quantum digital signatures, which allows a sender, Alice, to distribute quantum signatures to two parties, Bob and Charlie, such that they are able to authenticate that the message originated from Alice and that the message was not altered in transmission

    Understanding Quantum Technologies 2022

    Full text link
    Understanding Quantum Technologies 2022 is a creative-commons ebook that provides a unique 360 degrees overview of quantum technologies from science and technology to geopolitical and societal issues. It covers quantum physics history, quantum physics 101, gate-based quantum computing, quantum computing engineering (including quantum error corrections and quantum computing energetics), quantum computing hardware (all qubit types, including quantum annealing and quantum simulation paradigms, history, science, research, implementation and vendors), quantum enabling technologies (cryogenics, control electronics, photonics, components fabs, raw materials), quantum computing algorithms, software development tools and use cases, unconventional computing (potential alternatives to quantum and classical computing), quantum telecommunications and cryptography, quantum sensing, quantum technologies around the world, quantum technologies societal impact and even quantum fake sciences. The main audience are computer science engineers, developers and IT specialists as well as quantum scientists and students who want to acquire a global view of how quantum technologies work, and particularly quantum computing. This version is an extensive update to the 2021 edition published in October 2021.Comment: 1132 pages, 920 figures, Letter forma

    Investigating Modern Cryptography

    Get PDF
    In this thesis, a rigorous introduction of the modern cryptographic algorithms AES, RSA, and ECC, which represent the defacto standard used by the world (as of the year 2013), is presented in a fashion that is familiar to Mathematicians, Computer Scientists, and Engineers. This deposition, containing a breadth of knowledge, is meant to facilitate the understanding and application for cryptographic usage and implementation. In addition, a novel method for generating true random numbers is presented. This combined together with cryptography provides a solution for generating large keys and sequences required for cryptographic operations

    Proceedings of the 21st Conference on Formal Methods in Computer-Aided Design – FMCAD 2021

    Get PDF
    The Conference on Formal Methods in Computer-Aided Design (FMCAD) is an annual conference on the theory and applications of formal methods in hardware and system verification. FMCAD provides a leading forum to researchers in academia and industry for presenting and discussing groundbreaking methods, technologies, theoretical results, and tools for reasoning formally about computing systems. FMCAD covers formal aspects of computer-aided system design including verification, specification, synthesis, and testing

    XXV Congreso Argentino de Ciencias de la Computación - CACIC 2019: libro de actas

    Get PDF
    Trabajos presentados en el XXV Congreso Argentino de Ciencias de la Computación (CACIC), celebrado en la ciudad de Río Cuarto los días 14 al 18 de octubre de 2019 organizado por la Red de Universidades con Carreras en Informática (RedUNCI) y Facultad de Ciencias Exactas, Físico-Químicas y Naturales - Universidad Nacional de Río CuartoRed de Universidades con Carreras en Informátic

    XXV Congreso Argentino de Ciencias de la Computación - CACIC 2019: libro de actas

    Get PDF
    Trabajos presentados en el XXV Congreso Argentino de Ciencias de la Computación (CACIC), celebrado en la ciudad de Río Cuarto los días 14 al 18 de octubre de 2019 organizado por la Red de Universidades con Carreras en Informática (RedUNCI) y Facultad de Ciencias Exactas, Físico-Químicas y Naturales - Universidad Nacional de Río CuartoRed de Universidades con Carreras en Informátic
    corecore