A Hardware One-Time Pad Prototype Generator for Localising Cloud Security

In this paper, we examine a system for encrypting data before storing in the Cloud. Adopting this system gives excellent security to stored data and complete control for accessing data by the client at different locations. The motivation for developing this personal encryption came about because of poor Cloud security and doubts over the safety of public encryption algorithms which might contain backdoors. However, side-channel attacks and other unwanted third-party interventions in Cloud security, probably contribute more to the poor security record history. These factors led to the development of a prototype for personalising security locally which defeats cryptanalysis. The key distribution problem associated with random binary sequences called one-time-pads, does not exist for one-to-Cloud applications, unlike bidirectional communications where it was a big issue. The random binary sequences were generated from chaotic analogue oscillators with initial conditions from a data receiver. A JavaScript application processed the one-time pad and data using modulo two arithmetic and applied the von Neumann bias-removal algorithm to increase the overall entropy. The one-time pad binary sequences applied the fifteen tests in the National Institute of Standards and Technology statistical suite of tests to test for randomness. The one-time pads are transported between locations in a memory key device and the prototype encoder should have dimensions similar to a typical memory key device.

[1]  Werner Schindler,et al.  Random Number Generators for Cryptographic Applications , 2009, Cryptographic Engineering.

[2]  Jonathan Blackledge,et al.  On the Applications of Deterministic Chaos for Encrypting Data on the Cloud , 2011 .

[3]  X. Mou,et al.  On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .

[4]  John Kelsey,et al.  Recommendation for the Entropy Sources Used for Random Bit Generation , 2018 .

[5]  Salih Ergün,et al.  Security analysis of a chaos-based random number generator for applications in cryptography , 2015, 2015 15th International Symposium on Communications and Information Technologies (ISCIT).

[6]  Jonathan Blackledge,et al.  Stegacryption of DICOM Metadata , 2014 .

[7]  Sergei Bezobrazov,et al.  Cryptography using evolutionary computing , 2013 .

[8]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[9]  Robert A. K. Duncan,et al.  Enhancing Cloud Security and Privacy: The Power and the Weakness of the Audit Trail , 2016, CLOUD 2016.

[10]  Jonathan Blackledge,et al.  Entropy, Information, Landauer's Limit and Moore's Law , 2014 .

[11]  Diya Thomas,et al.  Medical image protection in cloud system , 2016 .

[12]  P. Tobin,et al.  Chaos-based cryptography for cloud computing , 2016, 2016 27th Irish Signals and Systems Conference (ISSC).

[13]  Salih Ergun Security analysis of a chaos-based random number generator for applications in cryptography , 2015 .

[14]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[15]  Paul Tobin PSpice for Circuit Theory and Electronic Devices , 2007, PSpice for Circuit Theory and Electronic Devices.

[16]  Lee Tobin,et al.  On the Development of a One-Time Pad Generator for Personalising Cloud Security , 2017 .

[17]  Kunihiro Asada,et al.  A High Speed IC Truly Random Number Generator Based on Chaotic Sampling of Regular Waveform , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[18]  Binder,et al.  Simulating chaotic behavior with finite-state machines. , 1986, Physical review. A, General physics.

[19]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[20]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[21]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..