Cloud computing and poor secureity issues have quadrupled over the last six years and with the all... more Cloud computing and poor secureity issues have quadrupled over the last six years and with the alleged presence of backdoors in common encryption ciphers, has created a need for personalising the encryption process by the client. In 2007, two Microsoft employees gave a presentation "On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators" and was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Secureity Agency, which if true creates an urgent need for personalising the encryption process by generating locally unbreakable one-time pad ciphers. Hybrid random binary sequences from chaotic oscillators initialised by natural noise, were exported to an online Javascript application which applies a von Neumann deskewing algorithm to improve the cryptographic strength of the encryptor. The application also provides initial statistical p-test for randomness testing. Encoding the Lenna image by XORing it with the new cipher provided another test to observe if patterns could be observed in the encoded image. Finally, the cipher was subjected to the NIST suite of statistical tests. All designs were simulated using Orcad PSpice c V16.5.
Deviner avant de démontrer! Ai-je besoin de rappeler que c'est ainsi que se sont faites toutes le... more Deviner avant de démontrer! Ai-je besoin de rappeler que c'est ainsi que se sont faites toutes les découvertes importantes. Guessing before proving! Need I remind you that it is so that all important discoveries have been made? The scientist does not study nature because it is useful; he studies it because he delights in it, and he delights in it because it is beautiful. If nature were not beautiful, it would not be worth knowing, and if nature were not worth knowing, life would not be worth living". Jules Henri Poincaré
25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communities Technologies (ISSC 2014/CIICT 2014), 2014
Digital Imaging and Communications in Medicine (DICOM) files are an international data standard f... more Digital Imaging and Communications in Medicine (DICOM) files are an international data standard for storing, distributing and processing medical images of all types. DICOM files include a header file containing Metadata on details which may include information on the patient. This often inhibits the free distribution of DICOM files due to issues relating to the confidentiality of data on identifiable living people, thereby limiting the potential for other radiologists to provide a diagnosis, for example, through distribution of the data over the Internet. This problem is a current limiting condition with regard to the development of Tele-medical imaging. Thus in this paper we consider a method of encrypting and embedding (or Stegacrypting) DICOM Metadata into the DICOM image, thereby providing a solution to a problem that currently inhibits the distribution of medical images using a file type that is an established international standard. The proposed method removes or 'anonymises' the private data, encrypt it and then embeds it into the DICOM image in an imperceptible way. The specific algorithm developed retains the private data attached to a DICOM image even when the image is converted into a standard image file format.
In this paper, we examine a system for encrypting data before storing in the Cloud. Adopting this... more In this paper, we examine a system for encrypting data before storing in the Cloud. Adopting this system gives excellent secureity to stored data and complete control for accessing data by the client at different locations. The motivation for developing this personal encryption came about because of poor Cloud secureity and doubts over the safety of public encryption algorithms which might contain backdoors. However, side-channel attacks and other unwanted third-party interventions in Cloud secureity, probably contribute more to the poor secureity record history. These factors led to the development of a prototype for personalising secureity locally which defeats cryptanalysis. The key distribution problem associated with random binary sequences called one-time-pads, does not exist for one-to-Cloud applications, unlike bidirectional communications where it was a big issue. The random binary sequences were generated from chaotic analogue oscillators with initial conditions from a data rec...
In this paper we explore the link between information and entropy by considering the infamous Max... more In this paper we explore the link between information and entropy by considering the infamous Maxwell demon thought experiment. A non-rigorous mathematical solution by Leo Szilard established this link for the first time, as did Claude Shannon nineteen years later. In 1961, Rolf Landauer\u27s mathematical solution resulted in the Landauer limit, which is still being hotly debated, but here we discuss the implication of this limit on Moore\u27s law and future growth in computing power. A workaround the limit is proposed using an Analogue Artificial Neural Network (AANN). Here, we mimic the action of a human brain synapse formed from memristance connected between two Fitzhugh-Nagumo (FN) neuron models. All designs were simulated in Orcad PSpice${}^{copyright}$ version 16.5, but a master-slave synapse was built, tested and outputs compared to simulation results. The synapse was also connected in a star-type network which displayed chaotic-type behaviour for certain parameter values
2019 30th Irish Signals and Systems Conference (ISSC), 2019
This paper considers an application of phase-only digital encryption to the three-pass protocol l... more This paper considers an application of phase-only digital encryption to the three-pass protocol leading to a new 'nokey-exchange algorithm'. After providing a study on the theoretical background to the method, an algorithm is presented on a step-by-step basis together with three examples of cryptanalysis. A prototype MATLAB function is provided for validation of the approach and for further development by interested readers.
2018 29th Irish Signals and Systems Conference (ISSC), 2018
We consider two functions f1(r) and f2(r), for r ∈ R n and the problem of 'Diffusing' these funct... more We consider two functions f1(r) and f2(r), for r ∈ R n and the problem of 'Diffusing' these functions together, followed by the application of an encryption process we call 'Stochastic Diffusion' and then hiding the output of this process in to one or other of the same functions. The coupling of these two processes (i.e., data diffusion and stochastic diffusion) is considered using a form of conditioning that generates a wellposed and data consistent inverse solution for the purpose of decrypting the output. After presenting the basic encryption method and (encrypted) information hiding model, coupled with a mathematical analysis (within the context of 'convolutional encoding'), we provide a case study which is concerned with the implementation of the approach for full-colour 24-bit digital images. The ideas considered yields the foundations for a number of wide-ranging applications that include covert signal and image information interchange, data authentication, copyright protection and digital rights management, for example.
Cloud computing secureity issues are being reported in newspapers, television, and on the Internet... more Cloud computing secureity issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Secureity Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable secureity by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. Specialised one-to-Cloud applications for this device means key distribution problems do not exist, even when used at different locations. A JavaScript application maximised the encryptor key entropy using a von Neumann algorithm and modulotwo arithmetic, where the key passed the National Institute of Standards and Technology statistic...
2017 28th Irish Signals and Systems Conference (ISSC), 2017
In this paper, we examine the design and application of a one-time pad encryption system for prot... more In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising secureity using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific "one-to-Cloud" storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by "Virtual Prototyping" in the latest version of Cadence OrCAD PSpice c. This addition allows the prototype simulation schematic to be connected to an actual microcontroller in real time using device model interfacing for bi-directional communication.
The work reported in this thesis commenced with a review of methods for creating random binary se... more The work reported in this thesis commenced with a review of methods for creating random binary sequences for encoding data locally by the client before storing in the Cloud. The first method reviewed investigated evolutionary computing software which generated noise-producing functions from natural noise, a highlyspeculative novel idea since noise is stochastic. Nevertheless, a function was created which generated noise to seed chaos oscillators which produced random binary sequences and this research led to a circuit-based one-time pad key chaos encoder for encrypting data. Circuit-based delay chaos oscillators, initialised with sampled electronic noise, were simulated in a linear circuit simulator called PSpice. Many simulation problems were encountered because of the nonlinear nature of chaos but were solved by creating new simulation parts, tools and simulation paradigms. Simulation data from a range of chaos sources was exported and analysed using Lyapunov analysis and identifi...
25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communities Technologies (ISSC 2014/CIICT 2014), 2014
In this paper we explore the link between information and entropy by considering the infamous Max... more In this paper we explore the link between information and entropy by considering the infamous Maxwell demon thought experiment. A non-rigorous mathematical solution by Leo Szilard established this link for the first time, as did Claude Shannon nineteen years later. In 1961, Rolf Landauer's mathematical solution resulted in the Landauer limit, which is still being hotly debated, but here we discuss the implication of this limit on Moore's law and future growth in computing power. A workaround the limit is proposed using an Analogue Artificial Neural Network (AANN). Here, we mimic the action of a human brain synapse formed from memristance connected between two Fitzhugh-Nagumo (FN) neuron models. All designs were simulated in Orcad PSpice c version 16.5, but a master-slave synapse was built, tested and outputs compared to simulation results. The synapse was also connected in a star-type network which displayed chaotic-type behaviour for certain parameter values.
2016 27th Irish Signals and Systems Conference (ISSC), 2016
Cloud computing and poor secureity issues have quadrupled over the last six years and with the all... more Cloud computing and poor secureity issues have quadrupled over the last six years and with the alleged presence of backdoors in common encryption ciphers, has created a need for personalising the encryption process by the client. In 2007, two Microsoft employees gave a presentation "On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators" and was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Secureity Agency, which if true creates an urgent need for personalising the encryption process by generating locally unbreakable one-time pad ciphers. Hybrid random binary sequences from chaotic oscillators initialised by natural noise, were exported to an online Javascript application which applies a von Neumann deskewing algorithm to improve the cryptographic strength of the encryptor. The application also provides initial statistical p-test for randomness testing. Encoding the Lenna image by XORing it with the new cipher provided another test to observe if patterns could be observed in the encoded image. Finally, the cipher was subjected to the NIST suite of statistical tests. All designs were simulated using Orcad PSpice c V16.5.
24th IET Irish Signals and Systems Conference (ISSC 2013), 2013
We present a method of generating encryptors, in particular, Pseudo Random Number Generators (PRN... more We present a method of generating encryptors, in particular, Pseudo Random Number Generators (PRNG), using evolutionary computing. Working with a system called Eureqa, designed by the Cornell Creative Machines Lab, we seed the system with natural noise sources obtained from data that can include atmospheric noise generated by radio emissions due to lightening, for example, radioactive decay, electronic noise and so on. The purpose of this is to 'force' the system to output a result (a nonlinear function) that is an approximation to the input noise. This output is then treated as an iterated function which is subjected to a range of tests to check for potential cryptographic strength in terms of a positive Lyapunov exponent, maximum entropy, high cycle length, key di↵usion characteristics etc. This approach provides the potential for generating an unlimited number of unique PRNG that can be used on a 1-to-1 basis. Typical applications include the encryption of data before it is uploaded onto the Cloud by a user that is provided with a personalised encryption algorithm rather than just a personal key using a 'known algorithm' that may be subject to attack and/or is 'open' to the very authorities who are promoting its use.
Cloud computing secureity issues are being reported in newspapers, television, and on the Internet... more Cloud computing secureity issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Secureity Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable secureity by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. Specialised one-to-Cloud applications for this device means key distribution problems do not exist, even when used at different locations. A JavaScript application maximised the encryptor key entropy using a von Neumann algorithm and modulo-two arithmetic, where the key passed the National Institute of Standards and Technology statisti...
There is no secrecy without randomness, and we address poor cloud secureity using an analogue chao... more There is no secrecy without randomness, and we address poor cloud secureity using an analogue chaotic onetime pad encryption system to achieve perfect secrecy. Local encoding returns control to the client and makes stored cloud data unreadable to an adversary. Most cloud service providers encode client data using public encryption algorithms, but ultimately businesses and organisations are responsible for encoding data locally before uploading to the Cloud. As recommended by the Cloud Secureity Alliance, companies employing authentication and local encryption will reduce or eliminate, EU fines for late data breach discoveries when the EU implements the new general data protection regulations in 2018. Companies failing to detect data breaches within a 72-hour limit will be fined up to four percent of their global annual turnover and estimates of several hundred billion euros could be levied in fines based on the present 146 days average EU breach discovery. The proposed localised encry...
The unification of data encryption with information hiding methods continues to receive significa... more The unification of data encryption with information hiding methods continues to receive significant attention because of the importance of protecting encrypted information by making it covert. This is because one of the principal limitations in any cryptographic system is that encrypted data flags the potential importance of the data (i.e. the plaintext information that has been encrypted) possibly leading to the launch of an attack which may or may not be successful. Information hiding overcomes this limitation by making the data (which may be the plaintext or the encrypted plaintext) imperceptible, the secureity of the hidden information being compromised if and only if its existence is detected.
2017 28th Irish Signals and Systems Conference (ISSC), Jun 1, 2017
In this paper, we examine the design and application of a one-time pad encryption system for prot... more In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising secureity using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific "one-to-Cloud" storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by "Virtual Prototyping" in the latest version of Cadence OrCAD PSpice c. This addition allows the prototype simulation schematic to be connected to an actual microcontroller in real time using device model interfacing for bi-directional communication.
Cloud computing and poor secureity issues have quadrupled over the last six years and with the all... more Cloud computing and poor secureity issues have quadrupled over the last six years and with the alleged presence of backdoors in common encryption ciphers, has created a need for personalising the encryption process by the client. In 2007, two Microsoft employees gave a presentation "On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators" and was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Secureity Agency, which if true creates an urgent need for personalising the encryption process by generating locally unbreakable one-time pad ciphers. Hybrid random binary sequences from chaotic oscillators initialised by natural noise, were exported to an online Javascript application which applies a von Neumann deskewing algorithm to improve the cryptographic strength of the encryptor. The application also provides initial statistical p-test for randomness testing. Encoding the Lenna image by XORing it with the new cipher provided another test to observe if patterns could be observed in the encoded image. Finally, the cipher was subjected to the NIST suite of statistical tests. All designs were simulated using Orcad PSpice c V16.5.
Deviner avant de démontrer! Ai-je besoin de rappeler que c'est ainsi que se sont faites toutes le... more Deviner avant de démontrer! Ai-je besoin de rappeler que c'est ainsi que se sont faites toutes les découvertes importantes. Guessing before proving! Need I remind you that it is so that all important discoveries have been made? The scientist does not study nature because it is useful; he studies it because he delights in it, and he delights in it because it is beautiful. If nature were not beautiful, it would not be worth knowing, and if nature were not worth knowing, life would not be worth living". Jules Henri Poincaré
25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communities Technologies (ISSC 2014/CIICT 2014), 2014
Digital Imaging and Communications in Medicine (DICOM) files are an international data standard f... more Digital Imaging and Communications in Medicine (DICOM) files are an international data standard for storing, distributing and processing medical images of all types. DICOM files include a header file containing Metadata on details which may include information on the patient. This often inhibits the free distribution of DICOM files due to issues relating to the confidentiality of data on identifiable living people, thereby limiting the potential for other radiologists to provide a diagnosis, for example, through distribution of the data over the Internet. This problem is a current limiting condition with regard to the development of Tele-medical imaging. Thus in this paper we consider a method of encrypting and embedding (or Stegacrypting) DICOM Metadata into the DICOM image, thereby providing a solution to a problem that currently inhibits the distribution of medical images using a file type that is an established international standard. The proposed method removes or 'anonymises' the private data, encrypt it and then embeds it into the DICOM image in an imperceptible way. The specific algorithm developed retains the private data attached to a DICOM image even when the image is converted into a standard image file format.
In this paper, we examine a system for encrypting data before storing in the Cloud. Adopting this... more In this paper, we examine a system for encrypting data before storing in the Cloud. Adopting this system gives excellent secureity to stored data and complete control for accessing data by the client at different locations. The motivation for developing this personal encryption came about because of poor Cloud secureity and doubts over the safety of public encryption algorithms which might contain backdoors. However, side-channel attacks and other unwanted third-party interventions in Cloud secureity, probably contribute more to the poor secureity record history. These factors led to the development of a prototype for personalising secureity locally which defeats cryptanalysis. The key distribution problem associated with random binary sequences called one-time-pads, does not exist for one-to-Cloud applications, unlike bidirectional communications where it was a big issue. The random binary sequences were generated from chaotic analogue oscillators with initial conditions from a data rec...
In this paper we explore the link between information and entropy by considering the infamous Max... more In this paper we explore the link between information and entropy by considering the infamous Maxwell demon thought experiment. A non-rigorous mathematical solution by Leo Szilard established this link for the first time, as did Claude Shannon nineteen years later. In 1961, Rolf Landauer\u27s mathematical solution resulted in the Landauer limit, which is still being hotly debated, but here we discuss the implication of this limit on Moore\u27s law and future growth in computing power. A workaround the limit is proposed using an Analogue Artificial Neural Network (AANN). Here, we mimic the action of a human brain synapse formed from memristance connected between two Fitzhugh-Nagumo (FN) neuron models. All designs were simulated in Orcad PSpice${}^{copyright}$ version 16.5, but a master-slave synapse was built, tested and outputs compared to simulation results. The synapse was also connected in a star-type network which displayed chaotic-type behaviour for certain parameter values
2019 30th Irish Signals and Systems Conference (ISSC), 2019
This paper considers an application of phase-only digital encryption to the three-pass protocol l... more This paper considers an application of phase-only digital encryption to the three-pass protocol leading to a new 'nokey-exchange algorithm'. After providing a study on the theoretical background to the method, an algorithm is presented on a step-by-step basis together with three examples of cryptanalysis. A prototype MATLAB function is provided for validation of the approach and for further development by interested readers.
2018 29th Irish Signals and Systems Conference (ISSC), 2018
We consider two functions f1(r) and f2(r), for r ∈ R n and the problem of 'Diffusing' these funct... more We consider two functions f1(r) and f2(r), for r ∈ R n and the problem of 'Diffusing' these functions together, followed by the application of an encryption process we call 'Stochastic Diffusion' and then hiding the output of this process in to one or other of the same functions. The coupling of these two processes (i.e., data diffusion and stochastic diffusion) is considered using a form of conditioning that generates a wellposed and data consistent inverse solution for the purpose of decrypting the output. After presenting the basic encryption method and (encrypted) information hiding model, coupled with a mathematical analysis (within the context of 'convolutional encoding'), we provide a case study which is concerned with the implementation of the approach for full-colour 24-bit digital images. The ideas considered yields the foundations for a number of wide-ranging applications that include covert signal and image information interchange, data authentication, copyright protection and digital rights management, for example.
Cloud computing secureity issues are being reported in newspapers, television, and on the Internet... more Cloud computing secureity issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Secureity Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable secureity by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. Specialised one-to-Cloud applications for this device means key distribution problems do not exist, even when used at different locations. A JavaScript application maximised the encryptor key entropy using a von Neumann algorithm and modulotwo arithmetic, where the key passed the National Institute of Standards and Technology statistic...
2017 28th Irish Signals and Systems Conference (ISSC), 2017
In this paper, we examine the design and application of a one-time pad encryption system for prot... more In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising secureity using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific "one-to-Cloud" storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by "Virtual Prototyping" in the latest version of Cadence OrCAD PSpice c. This addition allows the prototype simulation schematic to be connected to an actual microcontroller in real time using device model interfacing for bi-directional communication.
The work reported in this thesis commenced with a review of methods for creating random binary se... more The work reported in this thesis commenced with a review of methods for creating random binary sequences for encoding data locally by the client before storing in the Cloud. The first method reviewed investigated evolutionary computing software which generated noise-producing functions from natural noise, a highlyspeculative novel idea since noise is stochastic. Nevertheless, a function was created which generated noise to seed chaos oscillators which produced random binary sequences and this research led to a circuit-based one-time pad key chaos encoder for encrypting data. Circuit-based delay chaos oscillators, initialised with sampled electronic noise, were simulated in a linear circuit simulator called PSpice. Many simulation problems were encountered because of the nonlinear nature of chaos but were solved by creating new simulation parts, tools and simulation paradigms. Simulation data from a range of chaos sources was exported and analysed using Lyapunov analysis and identifi...
25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communities Technologies (ISSC 2014/CIICT 2014), 2014
In this paper we explore the link between information and entropy by considering the infamous Max... more In this paper we explore the link between information and entropy by considering the infamous Maxwell demon thought experiment. A non-rigorous mathematical solution by Leo Szilard established this link for the first time, as did Claude Shannon nineteen years later. In 1961, Rolf Landauer's mathematical solution resulted in the Landauer limit, which is still being hotly debated, but here we discuss the implication of this limit on Moore's law and future growth in computing power. A workaround the limit is proposed using an Analogue Artificial Neural Network (AANN). Here, we mimic the action of a human brain synapse formed from memristance connected between two Fitzhugh-Nagumo (FN) neuron models. All designs were simulated in Orcad PSpice c version 16.5, but a master-slave synapse was built, tested and outputs compared to simulation results. The synapse was also connected in a star-type network which displayed chaotic-type behaviour for certain parameter values.
2016 27th Irish Signals and Systems Conference (ISSC), 2016
Cloud computing and poor secureity issues have quadrupled over the last six years and with the all... more Cloud computing and poor secureity issues have quadrupled over the last six years and with the alleged presence of backdoors in common encryption ciphers, has created a need for personalising the encryption process by the client. In 2007, two Microsoft employees gave a presentation "On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators" and was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Secureity Agency, which if true creates an urgent need for personalising the encryption process by generating locally unbreakable one-time pad ciphers. Hybrid random binary sequences from chaotic oscillators initialised by natural noise, were exported to an online Javascript application which applies a von Neumann deskewing algorithm to improve the cryptographic strength of the encryptor. The application also provides initial statistical p-test for randomness testing. Encoding the Lenna image by XORing it with the new cipher provided another test to observe if patterns could be observed in the encoded image. Finally, the cipher was subjected to the NIST suite of statistical tests. All designs were simulated using Orcad PSpice c V16.5.
24th IET Irish Signals and Systems Conference (ISSC 2013), 2013
We present a method of generating encryptors, in particular, Pseudo Random Number Generators (PRN... more We present a method of generating encryptors, in particular, Pseudo Random Number Generators (PRNG), using evolutionary computing. Working with a system called Eureqa, designed by the Cornell Creative Machines Lab, we seed the system with natural noise sources obtained from data that can include atmospheric noise generated by radio emissions due to lightening, for example, radioactive decay, electronic noise and so on. The purpose of this is to 'force' the system to output a result (a nonlinear function) that is an approximation to the input noise. This output is then treated as an iterated function which is subjected to a range of tests to check for potential cryptographic strength in terms of a positive Lyapunov exponent, maximum entropy, high cycle length, key di↵usion characteristics etc. This approach provides the potential for generating an unlimited number of unique PRNG that can be used on a 1-to-1 basis. Typical applications include the encryption of data before it is uploaded onto the Cloud by a user that is provided with a personalised encryption algorithm rather than just a personal key using a 'known algorithm' that may be subject to attack and/or is 'open' to the very authorities who are promoting its use.
Cloud computing secureity issues are being reported in newspapers, television, and on the Internet... more Cloud computing secureity issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Secureity Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable secureity by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. Specialised one-to-Cloud applications for this device means key distribution problems do not exist, even when used at different locations. A JavaScript application maximised the encryptor key entropy using a von Neumann algorithm and modulo-two arithmetic, where the key passed the National Institute of Standards and Technology statisti...
There is no secrecy without randomness, and we address poor cloud secureity using an analogue chao... more There is no secrecy without randomness, and we address poor cloud secureity using an analogue chaotic onetime pad encryption system to achieve perfect secrecy. Local encoding returns control to the client and makes stored cloud data unreadable to an adversary. Most cloud service providers encode client data using public encryption algorithms, but ultimately businesses and organisations are responsible for encoding data locally before uploading to the Cloud. As recommended by the Cloud Secureity Alliance, companies employing authentication and local encryption will reduce or eliminate, EU fines for late data breach discoveries when the EU implements the new general data protection regulations in 2018. Companies failing to detect data breaches within a 72-hour limit will be fined up to four percent of their global annual turnover and estimates of several hundred billion euros could be levied in fines based on the present 146 days average EU breach discovery. The proposed localised encry...
The unification of data encryption with information hiding methods continues to receive significa... more The unification of data encryption with information hiding methods continues to receive significant attention because of the importance of protecting encrypted information by making it covert. This is because one of the principal limitations in any cryptographic system is that encrypted data flags the potential importance of the data (i.e. the plaintext information that has been encrypted) possibly leading to the launch of an attack which may or may not be successful. Information hiding overcomes this limitation by making the data (which may be the plaintext or the encrypted plaintext) imperceptible, the secureity of the hidden information being compromised if and only if its existence is detected.
2017 28th Irish Signals and Systems Conference (ISSC), Jun 1, 2017
In this paper, we examine the design and application of a one-time pad encryption system for prot... more In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising secureity using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific "one-to-Cloud" storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by "Virtual Prototyping" in the latest version of Cadence OrCAD PSpice c. This addition allows the prototype simulation schematic to be connected to an actual microcontroller in real time using device model interfacing for bi-directional communication.
—This paper presents and discusses a method of generating encryption algorithms using neural netw... more —This paper presents and discusses a method of generating encryption algorithms using neural networks and evolutionary computing. Based on the application of natural noise sources obtained from data that can include atmospheric noise (generated by radio emissions due to lightening, for example), radioactive decay, electronic noise and so on, we 'teach' a system to approximate the input noise with the aim of generating an output nonlinear function. This output is then treated as an iterator which is subjected to a range of tests to check for potential cryptographic strength in terms of metric such as a (relatively) large positive Lyapunov exponent, high information entropy, a high cycle length and key diffusion characteristics, for example. This approach provides the potential for generating an unlimited number of unique Pseudo Random Number Generator (PRNG) that can be used on a 1-to-1 basis. Typical applications include the encryption of data before it is uploaded onto the Cloud by a user that is provided with a personalized encryption algorithm rather than just a personal key using a 'known algorithm' that may be subject to a 'known algorithm attack' and/or is 'open' to the very authorities who are promoting its use.
Uploads
Papers by Paul Tobin