Chaotic Cryptography Using Augmented Lorenz Equations Aided by Quantum Key Distribution

We have recently developed a chaotic gas turbine whose rotational motion might simulate turbulent Rayleigh-Bénard convection. The nondimensionalized equations of motion of our turbine are expressed as a star network of N Lorenz subsystems, referred to as augmented Lorenz equations. Here, we propose an application of the augmented Lorenz equations to chaotic cryptography, as a type of symmetric secret-key cryptographic method, wherein message encryption is performed by superimposing the chaotic signal generated from the equations on a plaintext in much the same way as in one-time pad cryptography. The ciphertext is decrypted by unmasking the chaotic signal precisely reproduced with a secret key consisting of 2N-1 (e.g., N=101) real numbers that specify the augmented Lorenz equations. The transmitter and receiver are assumed to be connected via both a quantum communication channel on which the secret key is distributed using a quantum key distribution protocol and a classical data communication channel on which the ciphertext is transmitted. We discuss the security and feasibility of our cryptographic method.

[1]  Renato Renner,et al.  The ultimate physical limits of privacy , 2014, Nature.

[2]  Alan V. Oppenheim,et al.  Circuit implementation of synchronized chaos with applications to communications. , 1993, Physical review letters.

[3]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[4]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[5]  Alan V. Oppenheim,et al.  Synchronization of Lorenz-based chaotic circuits with applications to communications , 1993 .

[6]  M. Porfiri,et al.  Global stochastic synchronization of chaotic oscillators , 2008, 2008 American Control Conference.

[7]  Takaya Miyano,et al.  Chaos-Based Communications Using Open-Plus-Closed-Loop Control , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[8]  J. Bell On the Problem of Hidden Variables in Quantum Mechanics , 1966 .

[9]  N. Bohr II - Can Quantum-Mechanical Description of Physical Reality be Considered Complete? , 1935 .

[10]  J. Niemela,et al.  Mean wind and its reversal in thermal convection. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[11]  Toshiyuki Toriyama,et al.  Augmented Lorenz Equations as Physical Model for Chaotic Gas Turbine , 2012 .

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[14]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[15]  Adonis Bogris,et al.  Chaos-based communications at high bit rates using commercial fibre-optic links , 2006, SPIE/OSA/IEEE Asia Communications and Photonics.

[16]  Sadri Hassani,et al.  Nonlinear Dynamics and Chaos , 2000 .

[17]  Takaya Miyano,et al.  Synchronization of coupled augmented Lorenz oscillators with parameter mismatch , 2013 .

[18]  Detlef Lohse,et al.  Wind reversals in turbulent Rayleigh-Bénard convection. , 2004, Physical review letters.

[19]  D. Dieks Communication by EPR devices , 1982 .

[20]  Roberto Barrio,et al.  A three-parametric study of the Lorenz model , 2007 .

[21]  K. R. Sreenivasan,et al.  Turbulent convection at very high Rayleigh numbers , 1999, Nature.

[22]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[23]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[24]  A. Bershadskii,et al.  Chaos from turbulence: stochastic-chaotic equilibrium in turbulent convection at high Rayleigh numbers. , 2009, Chaos.

[25]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[26]  Ying-Cheng Lai,et al.  Communicating with chaos using two-dimensional symbolic dynamics , 1999 .

[27]  Michael Peter Kennedy,et al.  Chaos shift keying : modulation and demodulation of a chaotic carrier using self-sychronizing chua"s circuits , 1993 .

[28]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[29]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[30]  Carroll,et al.  Driving systems with chaotic signals. , 1991, Physical review. A, Atomic, molecular, and optical physics.

[31]  Guanrong Chen,et al.  A simple global synchronization criterion for coupled chaotic systems , 2003 .

[32]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[33]  P. Balasubramaniam,et al.  Synchronization and an application of a novel fractional order King Cobra chaotic system. , 2014, Chaos.

[34]  Gérard Bloch,et al.  Chaotic Cryptosystems: Cryptanalysis and Identifiability , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[35]  Roy Tenny,et al.  Using distributed nonlinear dynamics for public key encryption. , 2003, Physical review letters.

[36]  Shujun Li,et al.  Cryptanalysis of a new chaotic cryptosystem based on ergodicity , 2008, 0806.3183.

[37]  Hayes,et al.  Experimental control of chaos for communication. , 1994, Physical review letters.

[38]  Ljupco Kocarev,et al.  Chaotic block ciphers: from theory to practical algorithms , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[39]  Carroll,et al.  Synchronization in chaotic systems. , 1990, Physical review letters.

[40]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[41]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[42]  P R Tapster,et al.  erratum , 2002, Nature.

[43]  Laszlo B. Kish,et al.  On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator , 2013, Quantum Inf. Process..

[44]  Gumbs,et al.  Theory for the experimental observation of chaos in a rotating waterwheel. , 1992, Physical review. A, Atomic, molecular, and optical physics.

[45]  Peter W. Shor Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1999 .

[46]  Roy Tenny,et al.  Additive mixing modulation for public key encryption based on distributed dynamics , 2005, IEEE Transactions on Circuits and Systems I: Regular Papers.

[47]  Ljupco Kocarev,et al.  Public-key encryption with chaos. , 2004, Chaos.

[48]  Roberto Barrio,et al.  Bounds for the chaotic region in the Lorenz model , 2009 .

[49]  P. Grangier,et al.  Experimental Tests of Realistic Local Theories via Bell's Theorem , 1981 .

[50]  Toshiyuki Toriyama,et al.  Chaotic gas turbine subject to augmented Lorenz equations. , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.

[51]  Celia Anteneodo,et al.  Intermingled basins in coupled Lorenz systems. , 2011, Physical review. E, Statistical, nonlinear, and soft matter physics.

[52]  Yoshihisa Yamamoto,et al.  Practical quantum key distribution protocol without monitoring signal disturbance , 2014, Nature.

[53]  Laszlo B. Kish,et al.  Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.

[54]  Lin Wang,et al.  Performance Analysis of the CS-DCSK/BPSK Communication System , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.

[55]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[56]  James F. Dynes,et al.  A quantum access network , 2013, Nature.

[57]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[58]  A. W. Sharpe,et al.  Coexistence of High-Bit-Rate Quantum Key Distribution and Data on Optical Fiber , 2012, 1212.0033.