Security Analysis of Generalized Confidential Modulation

نویسنده

  • Hidema Tanaka
چکیده

We propose a new evaluation method for ‘generalized confidential modulation (GCM)’ for quantum communication. Confidential modulation realizes a secret communication by using secret information for modulation and noise in a channel. Y-00 is one of the famous methods of GCM for quantum communication. The existing evaluation methods for GCM are based on stream ciphers. They can estimate its analytical security and the evaluation depends on the security status of pseudo random number generator (PRNG) which controls the modulation. On the other hand, our method is based on mode of operation for block ciphers and clears the weaknesses from structural viewpoint. Using our method, we can compare the security of different GCM structures. Our method of security evaluation and comparison does not depend on the security status of PRNG. From the results of our evaluation, we conclude that the security of GCM is limited to computational security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Generalized Confidentialmodulation for Quantum Communication

We propose a new evaluation method for‘generalized confidential modulation(GCM)’ for quantum communication. Confidential modulationrealizes a secret communication by using secret information for modulationand noise in a channel. Y-00 is one of the famous methods of GCM forquantum communication. The existing evaluation methods for GCM arebased on stream ciphers. They can estimate its analytical ...

متن کامل

A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem

Database security prevents the disclosure of confidential data within a database to unauthorized users, and has become an urgent challenge for a tremendous number of database applications. Data encryption is a widely-used cryptographic technique for realizing database security in which the data kept in the database are encrypted into ciphertext. Inspired by Lin et al.’s database encryption syst...

متن کامل

Confidential Business Information in Jurisprudence and Iranian law

As a result of information technology era and possibility of swift access to information, endorsement of Confidential Business Information (CBI) has found an extraordinary importance; whereas the CBI concept and legal warranty in order to support it thoroughly in Iran is not emphasized in the framework of a specific law. This issue has led to legal problems in the trial with allegation of CBI v...

متن کامل

Comparison of the Effectiveness of Cognitive Therapy Based on Mindfulness and Life Therapy on Mental Well-Being and Psychological Security in Women with Generalized Anxiety Disorder: A Quasi-Experimental Study

Background and Objectives: Generalized anxiety disorder is one of the most common chronic anxiety disorders, and the role of psychotherapy in reducing its symptoms has been confirmed. The purpose of this study was to compare the effectiveness of cognitive therapy based on mindfulness and life therapy on mental well-being and psychological security in women with generalized anxiety disorder. Ma...

متن کامل

طراحی سیستم مخابراتی امن با استفاده از سنکرونکردن سیستمهای آشوبی

In this paper, the concept of secure synchronization of chaotic systems using adaptive and robust techniques , has been discussed and then a new secure communication scheme, based on secure synchronization of a general class of chaotic systems called Generalized Lorenz System, are presented. This communication scheme is combination of conventional cryptographic methods and chaotic modulation me...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013