Researchers prove the security of the Vector Stream Cipher

July 17, 2017, Kyoto University
Kyoto University demonstrates the security of a cipher based on chaos theory. Credit: Kyoto Univeristy / Eiri Ono

How do we know if the electronic keys we use in our devices are really secure? While it is possible to rigorously test the strength of a cipher—a kind of digital data lock—there are rarely any definitive proofs of unbreakability. Ciphers are highly complex, and while they may ward off certain attacks, they might be vulnerable to others.

Now, in a series of papers published in IEEE Transactions on Information Forensics and Security and IEICE Nonlinear Theory and Its Applications, researchers from Kyoto University have definitively demonstrated the strength of a cipher based on principles of chaos theory.

The group's Vector Stream Cipher (VSC) is the first example of a 128-bit key chaotic cipher with provable security. "We first developed VSC in 2004 as a simple, fast cipher, and parts of it have already been utilized in the private sector," explains Ken Umeno, leader of the study. "Many theoretical attacks in the past have failed to break it, but until now, we hadn't shown definitive proof of security."

The researchers conducted a number of tests, such as a method to evaluate the lock's randomness. Many ciphers rely on number sequences that appear to be random, but are actually generated through recurring relations that are vulnerable to being reproduced.

"Before evaluating the security of VSC with randomness tests, we found a way to make it significantly more reliable and sensitive," continues Umeno. "We then continued this refinement during the actual investigation."

The research highlights that VSC is not only secure, but structurally simple and low on memory usage compared with existing technology, making it useful for high-density data transmission applications such as in 5G mobile networks and 4K television broadcasts.

Umeno concludes, "Chaotic ciphers have been in use for about 30 years, but before this study we had not expected to find proof of . We hope that our work will be studied widely and applied throughout our digital world."

Explore further: Weakness of 2G mobile phone networks revealed

More information: "Further improving security of Vector Stream Cipher" Nonlinear Theory and Its Applications, IEICE, DOI: 10.1587/nolta.2.1101

Related Stories

Weakness of 2G mobile phone networks revealed

October 21, 2016

The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, A*STAR researches show. The ease of the attack shows an urgent need ...

New authentication code urged for digital data

June 3, 2005

The National Institute of Standards and Technology (NIST) is recommending a new algorithm for authenticating digital data for federal agencies. Called CMAC (cipher-based message authentication code), the algorithm can authenticate ...

Ensuring the security of digital information

May 31, 2017

Every day we store and transfer sensitive digital data, post personal information on social media, and provide valuable details to companies when we use their services. Keeping secure the 2.5 quintillion (2.5 million billion) ...

Recommended for you

China auto show highlights industry's electric ambitions

April 22, 2018

The biggest global auto show of the year showcases China's ambitions to become a leader in electric cars and the industry's multibillion-dollar scramble to roll out models that appeal to price-conscious but demanding Chinese ...

Robot designed for faster, safer uranium plant pipe cleanup

April 21, 2018

Ohio crews cleaning up a massive former Cold War-era uranium enrichment plant in Ohio plan this summer to deploy a high-tech helper: an autonomous, radiation-measuring robot that will roll through miles of large overhead ...

How social networking sites may discriminate against women

April 20, 2018

Social media and the sharing economy have created new opportunities by leveraging online networks to build trust and remove marketplace barriers. But a growing body of research suggests that old gender and racial biases persist, ...

Virtually modelling the human brain in a computer

April 19, 2018

Neurons that remain active even after the triggering stimulus has been silenced form the basis of short-term memory. The brain uses rhythmically active neurons to combine larger groups of neurons into functional units. Until ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.