NON-BREAKABLE DATA ENCRYPTION WITH CLASSICAL INFORMATION

Similar documents
Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

An Introduction to Cryptography

Digital Audio and Video Fidelity. Ken Wacks, Ph.D.

DELTA MODULATION AND DPCM CODING OF COLOR SIGNALS

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

Construction of Cable Digital TV Head-end. Yang Zhang

A LOW COST TRANSPORT STREAM (TS) GENERATOR USED IN DIGITAL VIDEO BROADCASTING EQUIPMENT MEASUREMENTS

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ISCAS.2005.

UTTR BEST TELEMETRY SOURCE SELECTOR

Audio Compression Technology for Voice Transmission

DIGITAL COMMUNICATION

Technical Article MS-2714

Permutation based speech scrambling for next generation mobile communication

Previous Lecture Sequential Circuits. Slide Summary of contents covered in this lecture. (Refer Slide Time: 01:55)

Dual Link DVI Receiver Implementation

Enhancing Performance in Multiple Execution Unit Architecture using Tomasulo Algorithm

Metastability Analysis of Synchronizer

Joint Optimization of Source-Channel Video Coding Using the H.264/AVC encoder and FEC Codes. Digital Signal and Image Processing Lab

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Figure 2: Original and PAM modulated image. Figure 4: Original image.

Why t? TEACHER NOTES MATH NSPIRED. Math Objectives. Vocabulary. About the Lesson

Optimization of Multi-Channel BCH Error Decoding for Common Cases. Russell Dill Master's Thesis Defense April 20, 2015

REGIONAL NETWORKS FOR BROADBAND CABLE TELEVISION OPERATIONS

Detection and demodulation of non-cooperative burst signal Feng Yue 1, Wu Guangzhi 1, Tao Min 1

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

P1: OTA/XYZ P2: ABC c01 JWBK457-Richardson March 22, :45 Printer Name: Yet to Come

The reduction in the number of flip-flops in a sequential circuit is referred to as the state-reduction problem.

Dual Link DVI Receiver Implementation

A Top-down Hierarchical Approach to the Display and Analysis of Seismic Data

CZT vs FFT: Flexibility vs Speed. Abstract

Overview of All Pixel Circuits for Active Matrix Organic Light Emitting Diode (AMOLED)

CS311: Data Communication. Transmission of Digital Signal - I

Introduction to Signal Processing D R. T A R E K T U T U N J I P H I L A D E L P H I A U N I V E R S I T Y

INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR NPTEL ONLINE CERTIFICATION COURSE. On Industrial Automation and Control

Company overview. Brief profile

Research Article Design and Analysis of a High Secure Video Encryption Algorithm with Integrated Compression and Denoising Block

How to Predict the Output of a Hardware Random Number Generator

VITERBI DECODER FOR NASA S SPACE SHUTTLE S TELEMETRY DATA

WATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak

Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels: CSC310 Information Theory.

Software vs Hardware Machine Control: Cost and Performance Compared

Implementation of a turbo codes test bed in the Simulink environment

Analysis of local and global timing and pitch change in ordinary

IEEE P a. IEEE P Wireless Personal Area Networks. hybrid modulation schemes and cameras ISC modes

A Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique

Exploring the Enigma [The MATH Connection]

Adaptive decoding of convolutional codes

IP Telephony and Some Factors that Influence Speech Quality

Access Fee Charging System for Information Contents SharingThrough P2P Communications

Practical Bit Error Rate Measurements on Fibre Optic Communications Links in Student Teaching Laboratories

User Requirements for Terrestrial Digital Broadcasting Services

1 Introduction to PSQM

V.Sorge/E.Ritter, Handout 5

Sherlock Holmes and the adventures of the dancing men

COMPRESSION OF DICOM IMAGES BASED ON WAVELETS AND SPIHT FOR TELEMEDICINE APPLICATIONS

Digital holographic security system based on multiple biometrics

Performance of a Low-Complexity Turbo Decoder and its Implementation on a Low-Cost, 16-Bit Fixed-Point DSP

Steganographic Technique for Hiding Secret Audio in an Image

A Video Frame Dropping Mechanism based on Audio Perception

Transmission System for ISDB-S

DisplayPort 1.4 Link Layer Compliance

On the design of turbo codes with convolutional interleavers

A Novel Video Compression Method Based on Underdetermined Blind Source Separation

ABCD. Application Note No Reeve Engineers. Transmission Level Point. 1. Introduction. 2. Application of the TLP

Research on sampling of vibration signals based on compressed sensing

Lab 5 Linear Predictive Coding

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Pseudorandom bit Generators for Secure Broadcasting Systems

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

CAP240 First semester 1430/1431. Sheet 4

SECURED EEG DISTRIBUTION IN TELEMEDICINE USING ENCRYPTION MECHANISM

FRAME ERROR RATE EVALUATION OF A C-ARQ PROTOCOL WITH MAXIMUM-LIKELIHOOD FRAME COMBINING

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

MPEG has been established as an international standard

TERRESTRIAL broadcasting of digital television (DTV)

Pivoting Object Tracking System

116 Facta Universitatis ser.: Elect. and Energ. vol. 11, No.1 è1998è to use any kind of encrypted information or with not very pleased attitude of loc

VLSI System Testing. BIST Motivation

The Impact of the DTV Transition on Consumers and Consumer Choice. Overview of the DTV Transition Situation

CS408 Cryptography & Internet Security

6.111 Project Proposal IMPLEMENTATION. Lyne Petse Szu-Po Wang Wenting Zheng

Review paper on study of various Interleavers and their significance

AN EXPLORATION OF THE BENEFITS OF MIGRATION TO DIGITAL BROADCASTING

SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure of audiovisual services Coding of moving video

News from Rohde&Schwarz Number 195 (2008/I)

MPO Technology Connectivity & Application

Eddy current tools for education and innovation

Introduction to Digital Signal Processing (DSP)

VIDEO SCRAMBLING - AN OVERVIEW. V. Bhaskaran, M. Davidov. CORPORATE RESEARCH AND DEVELOPMENT OAK Industries Inc., Rancho Bernardo, California 92127

Student Laboratory Experiments Exploring Optical Fibre Communication Systems, Eye Diagrams and Bit Error Rates

Digital Audio Design Validation and Debugging Using PGY-I2C

Design and Implementation of Data Scrambler & Descrambler System Using VHDL

ELEC 310 Digital Signal Processing

AC103/AT103 ANALOG & DIGITAL ELECTRONICS JUN 2015

Title: Lucent Technologies TDMA Half Rate Speech Codec

hit), and assume that longer incidental sounds (forest noise, water, wind noise) resemble a Gaussian noise distribution.

Lab experience 1: Introduction to LabView

Scalable Foveated Visual Information Coding and Communications

Institute of Southern Punjab, Multan

Transcription:

Fluctuation and Noise Letters Vol. 4, No. 2 (2004) C1 C5 c World Scientific Publishing Company NON-REKLE DT ENCRYPTION WITH CLSSICL INFORMTION LSZLO. KISH and SWMINTHN SETHURMN Texas &M University, Department of Electrical Engineering College Station, TX 77843-3128, US Received 12 May 2004 Revised 9 June 2004 ccepted 9 June 2004 Secure encryption of data is one of the most important parts of information technology and major concern of data security, military, defense and homeland security applications. The main aim of the paper is to propose a new way of approach to encryption. We propose a new possible approach [1] to encryption, which could be a fast, simple, inexpensive, robust, flexible, and mobile way of data encryption for absolutely secure data transmission by using classical digital information. The Eavesdropper is allowed to know the received signal thus the method has a higher level of protection than that of quantum encryption. Factorization algorithms do not help to break the code. Proper scrambling operators, which are necessary for the method, are study of current research. Keywords: Classical information; encryption. 1. Introduction Secure encryption of data is one of the most important parts of information technology and major concern of data security, military, defense and homeland security applications. So far, there is no secure practical way to encrypt the data. Depending on the type of encryption, if the Third Party (Eavesdropper) acquires enough knowledge about how the encryption is made and/or about the key, the Eavesdropper can decode the encrypted message. The general opinion is that classical information systems, either digital or analog, are not suitable for absolutely secure data encryption. This is the reason why governments, defense and funding agencies have been spending billions of dollars for the research of quantum encryption which has the potential to reach absolutely secure encryption. However, the performance of data transfer via quantum encryption is very poor, expensive and extremely slow. The reason for these deficiencies is the fact that quantum encryption requires generating, handling and detecting of single photons (or other particles) and that requirement implies short transfer distance (<one mile) or the need of a large number of repeaters which makes the system slow, expensive, fragile, less flexible and less mobile. Moreover, it usually needs at least two parallel information channels, a quantum one and a classical one. C1

C2 L.. Kish & S. Sethuraman The method proposed in this paper offers a fast, simple, inexpensive, robust, flexible, and mobile way of data encryption for absolutely secure data transmission by using classical digital information. The speed of transfer depends on the level of security and practically unbreakable encryption can be reached at a relatively high speed. The absolute security is supported by the following facts: (i) (ii) There are no shared secret keys or public keys to share between the Sender and the Receiver. The encoding keys are random and they exist only locally and temporarily. They are kept at the stations where they are generated and terminated after use. Therefore, the Eavesdropper has no way to acquire the actual encoding key, unless it has a physical access to the encoder or the decoder. (iii) nybody, including the Eavesdropper, is allowed to know the all details of the process how the encryption is made. (iv) The actual encoding key is random and it is changing for each message. Thus, the Eavesdropper is unable to succeed by using statistical analysis of the transmitted signals. 2. Description of the Method Table 1 illustrates how the method works. The arrows show the direction of signal transmission. Let us suppose that we have two data scrambling operators which satisfy the following relation: =. (1) (1) In the first step, the message u(t), and the random number sequence (seed) for the scrambling operator are generated. (2) Then the encoded signal is generated and sent to the Receiver through a channel which can be a public classical channel. The Eavesdropper cannot decode the message, even if he knows the operation because it is scrambled by an unknown random sequence. (3) The Receiver generates the random number sequence (seed) for the scrambling operator, then uses on the received message and generates. Then he sends back to the Sender. (4) The Sender receives the signal and removes the operator by applying its inverse on this signal. = u(t), in accordance with Eq. (1). Then the Sender sends the signal u(t) back to the Receiver. The Sender does not need the random seed for the operator any more, so he deletes it to secure non-breakability. (5) The Receiver decodes this signal by applying the inverse of operation thus he gets u(t) = u(t). The Receiver does not need the random seed for the operator any more, so he deletes it to secure non-breakability.

Non-breakable Simple Encryption with No Key to Share C3 Table. 1. Scheme of absolute secure data transfer by a public classical channel. The Eavesdropper is allowed to know almost everything except the seeds (random number sequences) used by the operators and. S T E P Sender Signal Transferred (Eavesdropper knows) Receiver 1) Message: u(t) Generates seed for: 2) u(t) u(t) u(t) 3) Generates seed for: 4) u(t) = u(t) u(t) u(t) 5) Deletes seed for: u(t) = u(t) Deletes seed for: Keeps: u(t) O P E R T O R S = R P = R P = R P = R P

C4 L.. Kish & S. Sethuraman The remaining part of the description is to identify what kind of scrambling operators can provide the non-breakability. The first condition, which is necessary for the basic operation of the method, is described by Eq. (1). However, this is not enough for nonbreakability. For example, let us imagine that the data sequence and the seeds consist of numbers +1 and -1 (instead of numbers zero and 1). Then the operators can be simply the multiplication by the seeds. Equation (1) holds and the encryption functions with division by the seeds used as inverse operators. However, it is easily breakable. Observing the signals in phase 2 and 3 (see Table 1) makes it very easy to determine the operator and its inverse. Thus after observing the signal in phase 4, it can be easily decoded. The necessary non-breakability condition for an operator C used with the present method is the following. The observation of a particular signal x(t) and the signal C x(t) obtained by the operation should not make it possible to determine how the operator will act on a different signal y(t) provided y(t) is statistically independent of x(t). In conclusion: The knowledge of x(t), C x(t) and y(t) should not be enough to determine C y(t). (2) Equation (1) and Condition 2 look like they are not easy to satisfy at the same time and the search for satisfactory operations is currently going on. In the rest of the paper, we show a simple operator below which may satisfy both Eq. (1) and Condition 2. Let us continue to work with data sequences containing +1 and -1 numbers only. Let the operator C be defined as follows: C = P C R C (3) where the operator P C makes a random permutation of the location of the data within the signal u(t) (that is, scrambles the variable t); and the operator R C multiplies the elements of the signal by the elements of a random data sequence r C (t). It can be shown that a fairly large subset of these operators satisfy both Eq. (1) and Condition 2. Note, alternative orderings of the permutation and random sequence operators are also relevant. The transferred signals will be completely scrambled and for long data lengths and supposedly there is no way to reconstruct the original message by the Eavesdropper because she has less known parameters than unknown variables and equations to solve. This assumption is still to be confirmed. If this realization works, it would have the following advantages when compared to quantum encryption: The encryption is more secure than quantum encryption because the Eavesdropper can be allowed to be present at the signal receiver and see all the received signals, which cannot be allowed at secure quantum communication. Moreover, the method needs only a single classical channel (quantum encryption needs two channels). Classical communication, so it is many orders of magnitude faster than quantum communication. It is simple, very cheap and can be easily installed at the software level. No maintenance is needed.

Non-breakable Simple Encryption with No Key to Share C5 Finally, it is important to emphasize that the main aim of this paper is to propose a new way of approach to encryption. The proper operators and the exact conditions of their working still have to be found or confirmed. It is also possible that the proposed method has to be expanded for satisfactory performance. For example, one can imagine that the original message is encrypted by different but related operators and these encrypted data are sent to the Receiver, who acts similarly before sending them back. Then the message would be decrypted in a more sophisticated way by combing the operators and the data packages. cknowledgements Valuable discussions with Janos ergou, Suhail Zubairy, Julio Gea anacloche, Deepa Kundur, Minoru Fujishima, Robert Vajtai and Gabe Schmera are appreciated. References [1] L.. Kish and S. Sethuraman, Non-reakable Encryption with Classical Information, Patent Disclosure, Texas &M University, TMU-TEES, May 11, 2004.