PERSEUS Technology: New Trends in Information and Communication Security
نویسنده
چکیده
Using cryptography to protect information and communication has bacically two major drawbacks. First, the specific entropy profile of encrypted data makes their detection very easy. Second, the use of cryptography can be more or less regulated, not to say forbidden, according to the countries. If the right to freely protect our personal and private data is a fundamental right, it must not hinder the action of Nation States with respect to National security. Allowing encryption to citizens holds for bad guys as well. In this paper we propose a new approach in information and communication security that may solve all these issues, thus representing a rather interesting trade-off between apparently opposite security needs. We introduce the concept of scalable security based on computationnally hard problem of coding theory with the Perseus technology. The core idea is to encode date with variable punctured convolutional codes in such a way that any cryptanalytic attempt will require a timeconsuming encoder reconstruction in order to decode. By adding noise in a suitable way, that reconstruction becomes untractable in practice except for Intelligence services that however must use supercomputers during a significant, scalable amount of time. Hence it limits naturally any will to unduly performs such attacks (eg. against citizens’ privacy). On the users’ side, encoder and noise parameters are first exchanged through an initial, short https session. The principles behind that approach have been mathematically validated in 1997 and 2007. We present the Perseus library we have developed under the triple GPL/LGPL/MPL licences. This library can be used to protect any kind of data.
منابع مشابه
A new method for accelerating impossible differential cryptanalysis and its application on LBlock
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملModern Communication Technology and National Security In the Middle East
One of the characteristics of the modern international systems is the undeniable role the new communication technologies play in different sections of human societies. Modern communication technologies such as satellites and computers have challenged the national authority and sovereignty of Vestfallian states. Although national states, specially, in the third world countries, extremely resist...
متن کاملDetermining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry
Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1101.0057 شماره
صفحات -
تاریخ انتشار 2010