Information and Communications Security: Encryption and Information Hiding

Similar documents
Multi-Map Orbit Hopping Chaotic Stream Cipher

Chaos-Based Symmetric Key Cryptosystems

Breaking an encryption scheme based on chaotic Baker map

Block Ciphers and Feistel cipher

arxiv: v1 [cs.cr] 18 Jul 2009

CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS

Introduction to Cryptology. Lecture 2

A Chaotic Encryption System Using PCA Neural Networks

Design and Hardware Implementation of a Chaotic Encryption Scheme for Real-time Embedded Systems

A novel pseudo-random number generator based on discrete chaotic iterations

PERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS

STREAM CIPHER. Chapter - 3

CRYPTOGRAPHY USING CHAOTIC NEURAL NETWORK

Lecture 12: Block ciphers

Image Encryption and Decryption Algorithm Using Two Dimensional Cellular Automata Rules In Cryptography

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Introduction to Modern Cryptography. Benny Chor

7 Cryptanalysis. 7.1 Structural Attacks CA642: CRYPTOGRAPHY AND NUMBER THEORY 1

Design of S-Box using Combination of Chaotic Functions

Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?

-Cryptosystem: A Chaos Based Public Key Cryptosystem

A new simple technique for improving the random properties of chaos-based cryptosystems

arxiv:cs/ v1 [cs.cr] 2 Feb 2004

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Cryptanalysis on An ElGamal-Like Cryptosystem for Encrypting Large Messages

Chaos and Cryptography

Weak key analysis for chaotic cipher based on randomness properties

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith

AES side channel attacks protection using random isomorphisms

functions. E.G.BARDIS*, N.G.BARDIS*, A.P.MARKOVSKI*, A.K.SPYROPOULOS**

Chaotic Based Secure Hash Algorithm

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky. Lecture 4

Lecture 1: Introduction to Public key cryptography

A Weak Cipher that Generates the Symmetric Group

THE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018

Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128

Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1

Chaos & Recursive. Ehsan Tahami. (Properties, Dynamics, and Applications ) PHD student of biomedical engineering

What is the Q in QRNG?

Pseudo-Random Generators

Cryptanalysis of a computer cryptography scheme based on a filter bank

Pseudo-Random Generators

Dynamical Systems and Chaos Part I: Theoretical Techniques. Lecture 4: Discrete systems + Chaos. Ilya Potapov Mathematics Department, TUT Room TD325

Concurrent Error Detection in S-boxes 1

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Formal Fault Analysis of Branch Predictors: Attacking countermeasures of Asymmetric key ciphers

Public-key Cryptography: Theory and Practice

Topics. Pseudo-Random Generators. Pseudo-Random Numbers. Truly Random Numbers

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur

IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers

Cryptography Lecture 4 Block ciphers, DES, breaking DES

Lecture 4: DES and block ciphers

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 9: Encryption modes. AES

Lecture Notes. Advanced Discrete Structures COT S

Cryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev

A Five-Round Algebraic Property of the Advanced Encryption Standard

Codes and Cryptography. Jorge L. Villar. MAMME, Fall 2015 PART XII

Improvements to Correlation Attacks Against Stream. Ciphers with Nonlinear Combiners. Brian Stottler Elizabethtown College

Implementation of the RSA algorithm and its cryptanalysis. Abstract. Introduction

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields

Algebraic Aspects of Symmetric-key Cryptography

A Stream Symmetric Homomorphic Encryption Scheme with Finite Automata

Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function

How does the computer generate observations from various distributions specified after input analysis?

A Pseudo-Random Encryption Mode

Analysis of SHA-1 in Encryption Mode

Computer Science A Cryptography and Data Security. Claude Crépeau

CPSC 531: Random Numbers. Jonathan Hudson Department of Computer Science University of Calgary

Outline. CPSC 418/MATH 318 Introduction to Cryptography. Information Theory. Partial Information. Perfect Secrecy, One-Time Pad

Research Article A Novel True Random Number Generator Based on Mouse Movement and a One-Dimensional Chaotic Map

A Block Cipher using an Iterative Method involving a Permutation

Analysis of cryptographic hash functions

Cryptographic Hash Functions

On ZK-Crypt, Book Stack, and Statistical Tests

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Optimized Interpolation Attacks on LowMC

Thesis Research Notes

Chaotic Random Bit Generator Realized with a Microcontroller

Construction of Pseudorandom Binary Sequences Using Chaotic Maps

CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER

Symmetric Crypto Systems

True & Deterministic Random Number Generators

Introduction to Dynamical Systems Basic Concepts of Dynamics

Cryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R)

Symmetric Crypto Systems

Public-Key Encryption: ElGamal, RSA, Rabin

RSA RSA public key cryptosystem

arxiv: v1 [cs.cr] 5 Dec 2007

Multi-algorithmic Cryptography using Deterministic Chaos with Applications to Mobile Communications

Discrete chaotic cryptography (DCC).

Public-key Cryptography and elliptic curves

CS 290G (Fall 2014) Introduction to Cryptography Oct 23rdd, Lecture 5: RSA OWFs. f N,e (x) = x e modn

A New Approach for Designing Key-Dependent S-Box Defined over GF (2 4 ) in AES

What is Chaos? Implications of Chaos 4/12/2010

Algebraic attack on stream ciphers Master s Thesis

On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision

Pseudorandom Generators

Transcription:

Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 9: Encryption using Chaos

Contents Chaos and Cryptography Iteration Functions Systems Chaos and Pseudo-Chaos Designing Chaos-based Encryption Algorithms Multi-algorithmicity Crypstic Demonstration of Crypstic Applications to Securing Data on the Cloud Summary

What is the Problem?

The Concept Chaos Theory Mathematical study of nonlinear dynamical systems Cryptology Mathematical study of cryptography & cryptanalysis Chaos-based Cryptology

Complexity Why use Chaos? A Complexity Theoretic Approach based on Multi-Algorithmicity Chaotic Ordered Random Information Entropy

Applications Stream coding Spread Spectrum

http://www.lexicon-data.com

Cycle Length Analysis using Autocorrelation & Power Spectrum

Cryptography using Chaos Founders of Modern Cryptography Founders of Chaos Theory Claude Shannon Vladimir Kotelnikov Algorithm(s) for n Mitchell Feigenbaum Benoit Mandelbrot Iteration Function Systems (IFS)

Brief History of Chaos-based Cryptography Early 1950s: Shannon explicitly mentions that the basic stretch-and-fold mechanism of chaos can be used in cryptology. Silent period until the late1980s. Chaos theory becomes popular Cryptography becomes more important ~ 30 publications in 1990s Various ciphers suggested Focus on analog circuits Claude Shannon 1916-2001 2000++: Chaos begins to be recognized Spread spectrum for military communications Launch of Crypstic by Lexicon Data Limited

Chaos and Cryptology: Similarities 1 Deterministic chaotic map encryption algorithm Complex and Unpredictable random-like behavior for any external observer with no a priori knowledge of the algorithm and initial condition - key

Chaos and Cryptology Similarities 2 Chaos Cryptography sensitivity to initial conditions key-dependent diffusion Small variations of any variable changes the outputs considerably Modification of 1 bit of the plaintext or key should change all bits of the ciphertext with probability 50%.

Chaos and Cryptology Similarities 3 Chaos topological transitivity with iterative process Cryptography multi-round transformations Bounded state space, self-mapping, extension of a state point over the whole state space Iterative transformations with a single chaotic map

Chaos and Cryptology Principal Differences Chaotic systems are defined on real/complex numbers spaces (bounded continuous space) whereas cryptography uses binary sequences (finite discrete space) Chaos theory aims to understand the asymptotic behavior of iterative process whereas cryptography focuses on the properties of relatively few iterations

Chaos Theory.v. Cryptography

Properties of Chaotic Systems Required for Cryptography Sensitivity to the initial conditions It is impossible to predict the behaviour of the system even if we have partial knowledge of its organization. Topological transitivity The state point stays within a bounded state space and approaches infinitely closely to any point of the state space.

A Deterministic Chaotic System Deterministic system is defined by a IFS f(x) Input is initial condition x 0 and parameter r Output is a sequence of states: x 1, x 2, x 3, where x i +1 = f (x i, r) parameter r initial condition x 0 iteration function f time series x 1, x 2,

Matthews Cipher

Chaos and Pseudo-Chaos True Chaos has an infinite number of states Pseudo-Chaos has a finite number of states Involves approximation of continuous chaos with floating- or fixed-point arithmetic Leads to discrete chaos-like system with low cycle lengths

Floating-point Approximation Continuous Chaos 0 1 x 2 x 3 x 0 x 1 Floating-point Approximation ( ) ( ) ( ) ( ) 0 1 x 2, x 3, x 4, x 0 x 1

Example Cycle Length Distribution (Vurhulst Process)

Chaos.v. Pseudo Chaos Infinite orbit (Chaos) Finite orbits (Pseudo-Chaos)

Cryptographically Good Orbits Single orbit Multiple orbits of the same length

The Lyapunov Exponent Measures the sensitivity of an iterated function to the initial condition (key) Require the exponent to be: - >0 (chaotic behaviour) - approach 1 (extent of chaoticity) linear growth level off exponential growth

Maximum Entropy Ciphers PDFs of chaotic iterators are not uniform Bit stream cipher generated using a uniform PDF partitioning strategy to maximize entropy of cipher Encryption based on XOR operation

Example of a Chaotic Cipher with Poor Statistical Characteristics

Basic Design Steps

Chaos-based.v. Conventional Encryption Algorithms Chaos-based cryptography has many disadvantages accept with regard to one important issue: can invent an unlimited number of algorithms

Multi-algorithmicity: Meta-Encryption Engines Single Encryption Algorithm Multiple Encryption Algorithms Algorithms Energy Algorithm 1D Search Domain Energy Keys 2D Search Domain Keys Keys

Chaotic Function Selection over Chaotic Block Lengths Analogous to the M Algorithm which is a method for combining multiple pseudo random streams to increase their security where one generators output is used to select a delayed output from another generator. The last floating point number of a current block cipher is used to seed the next block cipher

Example Algorithms and Parameter Settings

Crypstic provides a unique encryption engine (unique set of algorithms) mounted on a single pair of portable USB flash memory units Includes Honey pot disinformation, e.g. other encryption applications New meta-encryption engine provided if Crypstic is compromised Enigma Scherbius Shannon Crypstic TM

Covert Access Through Obfuscation Camouflage encryption engine by embedding it in files of a similar type: a dll file Execution is based on renaming a known dll to a known exe file through deletion Requires that application is software engineered to be Forensically Inert

Demonstration of Crypstic http://eleceng.dit.ie/arg/downloads/crypstic.zip Multi-Algorithmic Block Encryption Engine Unique set of algorithms for each encryption engine Algorithm selection & initiation seeded by file properties Passes all statistical test recommended by NIST, USA Implementation Flash memory Forensically inert Key-logging evasion

Applications to Cloud Computing

Advantages.v. Disadvantages Sovereignty is a potential major problem for the Cloud Need to treat the Cloud as a hostile territory User-based security is the most likely solution

Cloud Security Cloud computing only represents 4% of current IT spend and is expected to more than double by 2012 Software as a Service (SaaS) by itself is projected to nearly double from $9B to $17B (less than 10% of total market) User-security underpins acceptance of cloud architecture Each user has own encryption engine enabling both protection and control PC + Crypstic

Evolutionary Computing for designing multiple ciphers

Example: The Bezobrazov Cipher (Class Type: Atmospheric Noise from www.random.org)

Cipher Generation using Artificial Intelligence

Example of a ANN Generated Cipher (Class Type: Atmospheric Noise from www.random.org) Original Data Stream ANN Approximation

Summary Chaos-based encryption has many disadvantages compared with conventional encryption algorithms: - computationally inefficient - low cycle lengths The principal advantage is that it provides the potential for developing an unlimited number of algorithms that can be used to produce a multi-algorithmic solution Algorithms can be published so that approach conforms to the Kerchhoff-Shannon Principle in the knowledge that a new set of chaos-based algorithms can be developed.

Open Problems Structurally stable pseudo-chaotic systems Require a structurally stable cryptosystem, i.e. a system that has (almost) the same cycle length and Lyapunov exponents for all initial conditions. Most of the known pseudo-chaotic systems do not possess this property Conditions of unpredictability for chaotic systems What properties of a chaotic system guarantee its computational unpredictability?

Chaos based Asymmetric Encryption Asymmetric cryptographic systems are based on trapdoor functions, i.e. functions that have a oneway property unless a secret parameter (trapdoor) is known No counterpart of a trapdoor transformation is, as yet, known in chaos theory

Forensically Inert Software Engineering Conventional software engineering Clarity > Efficiency :: Data > Process Forensically inert software engineering for Obfuscation > Efficiency :: Camouflage > Process What are the paradigms best suited to the development of forensically inert applications?