4 research outputs found

    Black holes as random particles: entanglement dynamics in infinite range and matrix models

    Get PDF
    We first propose and study a quantum toy model of black hole dynamics. The model is unitary, displays quantum thermalization, and the Hamiltonian couples every oscillator with every other, a feature intended to emulate the color sector physics of large-N\mathcal{N} matrix models. Considering out of equilibrium initial states, we analytically compute the time evolution of every correlator of the theory and of the entanglement entropies, allowing a proper discussion of global thermalization/scrambling of information through the entire system. Microscopic non-locality causes factorization of reduced density matrices, and entanglement just depends on the time evolution of occupation densities. In the second part of the article, we show how the gained intuition extends to large-N\mathcal{N} matrix models, where we provide a gauge invariant entanglement entropy for `generalized free fields', again depending solely on the quasinormal frequencies. The results challenge the fast scrambling conjecture and point to a natural scenario for the emergence of the so-called brick wall or stretched horizon. Finally, peculiarities of these models in regards to the thermodynamic limit and the information paradox are highlighted.Comment: Journal versio

    Authenticated public key elliptic curve based on deep convolutional neural network for cybersecurity image encryption application

    Get PDF
    The demand for cybersecurity is growing to safeguard information flow and enhance data privacy. This essay suggests a novel authenticated public key elliptic curve based on a deep convolutional neural network (APK-EC-DCNN) for cybersecurity image encryption application. The public key elliptic curve discrete logarithmic problem (EC-DLP) is used for elliptic curve Diffie–Hellman key exchange (EC-DHKE) in order to generate a shared session key, which is used as the chaotic system’s beginning conditions and control parameters. In addition, the authenticity and confidentiality can be archived based on ECC to share the (Formula presented.) parameters between two parties by using the EC-DHKE algorithm. Moreover, the 3D Quantum Chaotic Logistic Map (3D QCLM) has an extremely chaotic behavior of the bifurcation diagram and high Lyapunov exponent, which can be used in high-level security. In addition, in order to achieve the authentication property, the secure hash function uses the output sequence of the DCNN and the output sequence of the 3D QCLM in the proposed authenticated expansion diffusion matrix (AEDM). Finally, partial frequency domain encryption (PFDE) technique is achieved by using the discrete wavelet transform in order to satisfy the robustness and fast encryption process. Simulation results and security analysis demonstrate that the proposed encryption algorithm achieved the performance of the state-of-the-art techniques in terms of quality, security, and robustness against noise- and signal-processing attacks

    Quasi group based crypto-system

    Get PDF
    For electronic commerce and other applications it is required to encrypt data that is transmitted over an unsecured channel. The data is encrypted/randomized using a key. Algorithms such as DES and ECC randomize the data such that un-authorized user cannot decrypt it .This thesis presents a practical implementation of a quasi group based multilevel, indexed scrambling transformation for use in signal encryption. Results of experiments with text and speech scrambling are presented. It is shown that the quasi group transformation maximizes the entropy at the output, which is desirable for a good system. This system provides extremely large group of keys that ensures enhanced security. It can work in either the chain mode or the block mode. Block mode is more tolerant to errors compared to the chain mode
    corecore