Adaptive encryption protocols

Some new ideas are presented for the improvement of the known QKD protocols and their application to an Internet environment. The full automatization of a technological setup is considered, as a result of the property of most basic QKD protocols to have the appearance of step by step algorithmic procedures and thus to offer themselves to materialization as computer code applications. This is the basis for the creation of a computer network connecting various users to be developed, working as an expert system and making decisions on the best strategy to recognize and counter especially dangerous eavesdropper attacks. The use of robotic technology, knowledge based simulation of the most dangerous and complicated attacks, game theory and neuronal networks to make these decisions, permits the system to adapt its behavior in the face of adverse situations. An elementary example of adaptivity of QKD protocols, by the use of game theory, is given.

[1]  M.I. Youssef,et al.  A novel data hiding technique using residue number system , 2003, Proceedings of the Twentieth National Radio Science Conference (NRSC'2003) (IEEE Cat. No.03EX665).

[2]  Konstantinos Karamanos Entropy analysis of substitutive sequences revisited , 2001 .

[3]  Physical Review , 1965, Nature.

[4]  N. MacDonald Nonlinear dynamics , 1980, Nature.

[5]  Athanasios Drigas,et al.  Stream Ciphers created by a Discrete Dynamic System for application in the Internet , 2004 .

[6]  Leon O. Chua,et al.  Properties of admissible symbolic sequences in a second-order digital filter with overflow non-linearity , 1993, Int. J. Circuit Theory Appl..

[7]  Orla Feely Nonlinear dynamics and chaos in Sigma-Delta modulation , 1994 .

[8]  A. P. MARKOVSKYY Methods for Design of Balanced Boolean Functions Satisfying Strict Avalanche Criterion ( SAC ) , 2004 .

[9]  M. I. Youssef,et al.  A Novel Secure Image Ciphering Technique Based On Chaos , 2004 .

[10]  Nikolaos P. Papadakos,et al.  Quantum Information Theory and Applications to Quantum Cryptography , 2002, quant-ph/0201057.

[11]  Peterson,et al.  Free space quantum key distribution in daylight , 2002, QELS 2002.

[12]  L. Chua,et al.  Symbolic dynamics of piecewise-linear maps , 1994 .

[13]  Leon O. Chua,et al.  Chaos and fractals from third-order digital filters , 1990, Int. J. Circuit Theory Appl..

[14]  Orla Feely Nonlinear dynamics of chaotic double-loop sigma-delta modulation , 1994, Proceedings of IEEE International Symposium on Circuits and Systems - ISCAS '94.

[15]  Orla Feely,et al.  The model-matching problem for a special class of discrete systems with discontinuity , 1998 .

[16]  Anastasios Bezerianos,et al.  Secure communication protocols with discrete nonlinear chaotic maps , 2001, J. Syst. Archit..

[17]  L. Chua,et al.  NONLINEAR DYNAMICS OF A CLASS OF ANALOG-TO-DIGITAL CONVERTERS , 1992 .

[18]  Zbigniew Galias,et al.  Bifurcation phenomena in second-order digital filter with saturation-type adder overflow characteristic , 1990 .

[19]  Zbigniew Galias,et al.  On symbolic dynamics of a chaotic second-order digital filter , 1992, Int. J. Circuit Theory Appl..

[20]  Iwao Sasase,et al.  A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.