A major aim of the field of cryptography is to design cryptosystems that is both provably secure and practical. Symmetric-key (private-key) methods have traditionally been viewed as practical in terms of typically a smaller key size, which means less storage requirements, and also faster processing. This, however, opens the protocols up to certain vulnerabilities, such as brute-force attacks. To reduce risk, the cryptographic keys are made longer, which in turn adds overhead burden and makes the scheme less practical. One-time pad (OTP) is a symmetric-type encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, a plaintext is paired with a random secret key (also referred to as OTP).
Asymmetric-type (public-key, asymptotic) frameworks use pairs of keys consisting of a public and private key, and these models depend heavily on the privacy of the non-public key. Asymmetric-based protocols are generally much slower than symmetric approaches in practice. Hypertext Transfer Protocol Secure (HTTPS) protocol which is the backbone of internet security uses the Transport Layer Security (TLS) protocol stack in Transmission Control Protocol / Internet Protocol (TCP/IP) for secure and private data transfer. TLS is a protocol suite that uses a myriad of other protocols to guarantee security. Many of these subprotocols consume a lot of CPU power and are complex processes which are not optimized for big data applications. TLS uses public-key cryptography paradigms to exchange the keys between the communicating parties through the TLS handshake protocol.
Unfortunately, traditional cryptographic algorithms and protocols (including schemes above and incorporating TLS, RSA, and AES) are not well suited in big data applications, as they need to perform a significant number of computations in practice. In turn, cloud providers face increasing CPU processing times and power usage to appropriately maintain services. In the modern computing era with quantum architecture and increased access to network and cloud resources, the speed and integrity of such outmoded cryptographic models will be put to the test.
To overcome these challenges, researchers at UC Santa Cruz (UCSC) have developed a new cryptographic approach with primary aims to reduce decryption complexity. UCSC’s new security paradigm for archival data targets perfect secrecy while featuring an extra-compact key for encryption of data for public exposure, such as cloud storage. In the primary method embodiment, digital data is extracted comprising one or more batches. Each batch includes no more than a number T of packets (T>1) and, each packet contains a number n of bits (n>1). The method generated a random binary matrix common key (CK) consisting of T rows and n columns. For a first batch, a first random n-bit temporary key is generated and positions of the nT elements of matrix CK are randomized to produce randomized matrix CK(RP). Further, the method includes for each digital data packet in the first batch, generating a packet vector key based on non-overlapping pairs of bit positions for both the temporary key and for a row of randomized matrix CK(RP) which corresponds to the number of the packet in the batch. Still further, the method includes generating an encrypted packet for the packet based on the packet and the packet vector key. This modality moves beyond conventional frameworks by providing a substantially higher level of security, including perfect security in some embodiments, with substantially smaller keys than in previous UCSC approaches.
|United States Of America||Issued Patent||11,741,268||08/29/2023||2020-289|
Additional Patent Pending
cryptographic, cryptography, cryptosystem, security, internet security, digital security, symmetric, asymmetric, encryption, encrypt