Real-Time Symmetric Cryptography using Quaternion Julia Set

Summary In this paper, Quaternion Julia set is used to generate real-time based symmetric keys for cryptography. The number of iterations, complex number and control value are the determining parameters of dynamically varying quaternion Julia image structure. The considered parameters are initialised in the proposed model of symmetric key generation during the establishment of communication between hosts. The model generates variable length, dynamic, one time usable key from quaternion Julia image to encrypt or decrypt data without involving the exchange of key. The time stamp used during the initialization process makes the quaternion Julia image to be different in real-time. The instantaneous key is generated at the hosts independently in a synchronous fashion to enhance the complexity in cryptanalysis. The proposed model has wide range of applications from low confidential to high confidential data transfer in two party and multi-party scenarios.

[1]  Bruce Schneier,et al.  Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES , 1996, CRYPTO.

[2]  John C. Hart,et al.  Visualizing quaternion rotation , 1994, TOGS.

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[5]  Louis H. Kauffman,et al.  Hypercomplex Iterations: Distance Estimation and Higher Dimensional Fractals , 2002 .

[6]  Thomas E. Price,et al.  Julia sets and the Mandelbrot set , 2009 .

[7]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  A. Samsudin,et al.  New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets , 2007 .

[10]  H. L. Hime “The Elements of Quaternions” , 1894, Nature.

[11]  William Rowan Hamilton,et al.  Elements of Quaternions , 1969 .

[12]  J. Milnor,et al.  Dynamics in One Complex Variable: Introductory Lectures , 2000 .

[13]  Sung-Ming Yen Cryptanalysis of an authentication and key distribution protocol , 1999, IEEE Commun. Lett..

[14]  Chung-Huang Yang,et al.  Pseudorandom bit generators in stream-cipher cryptography , 1991, Computer.

[15]  Bruce Schneier,et al.  Key-Schedule Cryptanalysis of DEAL , 1999, Selected Areas in Cryptography.

[16]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[17]  Fuzhen Zhang Quaternions and matrices of quaternions , 1997 .

[18]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[19]  A. Douady Julia Sets and the Mandelbrot Set , 1986 .

[20]  Burton S. Kaliski A survey of encryption standards , 1993, IEEE Micro.