25,321 research outputs found
Cryptographical Properties of Ising Spin Systems
The relation between Ising spin systems and public-key cryptography is
investigated using methods of statistical physics. The insight gained from the
analysis is used for devising a matrix-based cryptosystem whereby the
ciphertext comprises products of the original message bits; these are selected
by employing two predetermined randomly-constructed sparse matrices. The
ciphertext is decrypted using methods of belief-propagation. The analyzed
properties of the suggested cryptosystem show robustness against various
attacks and competitive performance to modern cyptographical methods.Comment: 4 pages, 2 figure
Computer science in a multidisciplinary environment : quantum cryptography and econophysics
Students of computer science are becoming increasingly specialized, but to work in
multidisciplinary teams they need to appreciate different perspectives and methods. This Final
Year Project was carried out in the Physics department at Kochi University of Technology
(Japan), and it concerns two interdisciplinary fields: quantum cryptography and econophysics. In the field of quantum cryptography, two of the most representative protocols for quantum key
distribution, BB84 and B92, were analyzed and compared; their practical implementation was
also described. In the field of econophysics, we explored the properties of the statistical family of LĂ©vy distributions, which are applied in financial computing to model the evolution of prices.GarcĂ©s DĂaz-MunĂo, GV. (2009). Computer science in a multidisciplinary environment : quantum cryptography and econophysics. http://hdl.handle.net/10251/14792
Interacting neural networks and cryptography
Two neural networks which are trained on their mutual output bits are
analysed using methods of statistical physics. The exact solution of the
dynamics of the two weight vectors shows a novel phenomenon: The networks
synchronize to a state with identical time dependent weights. Extending the
models to multilayer networks with discrete weights, it is shown how
synchronization by mutual learning can be applied to secret key exchange over a
public channel.Comment: Invited talk for the meeting of the German Physical Societ
Synchronization of spatiotemporal semiconductor lasers and its application in color image encryption
Optical chaos is a topic of current research characterized by
high-dimensional nonlinearity which is attributed to the delay-induced
dynamics, high bandwidth and easy modular implementation of optical feedback.
In light of these facts, which adds enough confusion and diffusion properties
for secure communications, we explore the synchronization phenomena in
spatiotemporal semiconductor laser systems. The novel system is used in a
two-phase colored image encryption process. The high-dimensional chaotic
attractor generated by the system produces a completely randomized chaotic time
series, which is ideal in the secure encoding of messages. The scheme thus
illustrated is a two-phase encryption method, which provides sufficiently high
confusion and diffusion properties of chaotic cryptosystem employed with unique
data sets of processed chaotic sequences. In this novel method of cryptography,
the chaotic phase masks are represented as images using the chaotic sequences
as the elements of the image. The scheme drastically permutes the positions of
the picture elements. The next additional layer of security further alters the
statistical information of the original image to a great extent along the
three-color planes. The intermediate results during encryption demonstrate the
infeasibility for an unauthorized user to decipher the cipher image. Exhaustive
statistical tests conducted validate that the scheme is robust against noise
and resistant to common attacks due to the double shield of encryption and the
infinite dimensionality of the relevant system of partial differential
equations.Comment: 20 pages, 11 figures; Article in press, Optics Communications (2011
A Pseudo DNA Cryptography Method
The DNA cryptography is a new and very promising direction in cryptography
research. DNA can be used in cryptography for storing and transmitting the
information, as well as for computation. Although in its primitive stage, DNA
cryptography is shown to be very effective. Currently, several DNA computing
algorithms are proposed for quite some cryptography, cryptanalysis and
steganography problems, and they are very powerful in these areas. However, the
use of the DNA as a means of cryptography has high tech lab requirements and
computational limitations, as well as the labor intensive extrapolation means
so far. These make the efficient use of DNA cryptography difficult in the
security world now. Therefore, more theoretical analysis should be performed
before its real applications.
In this project, We do not intended to utilize real DNA to perform the
cryptography process; rather, We will introduce a new cryptography method based
on central dogma of molecular biology. Since this method simulates some
critical processes in central dogma, it is a pseudo DNA cryptography method.
The theoretical analysis and experiments show this method to be efficient in
computation, storage and transmission; and it is very powerful against certain
attacks. Thus, this method can be of many uses in cryptography, such as an
enhancement insecurity and speed to the other cryptography methods. There are
also extensions and variations to this method, which have enhanced security,
effectiveness and applicability.Comment: A small work that quite some people asked abou
- …