Non-symbolic fragmentation cryptographic algorithms

نویسنده

  • Henry David James Coupe
چکیده

Non-symbolic fragmentation is an existing method for securing data. It has benefits over conventional cryptography and, due to its relative simplicity, can be made to execute very quickly. Fragmentation (in this research) refers to the breaking up of data into fragments of random length, followed by the sequential allocation of each of these fragments to one of a number of streams. This is called non-symbolic fragmentation when the fragment sizes are not necessarily a whole number of bytes in length and subsymbolic fragmentation if all of the fragment sizes are less than 8 bits in length. If a file is sub-symbolically fragmented then, as long as no two consecutive fragments are allocated to the same stream, each byte in the original file will not exist entirely within any one stream after fragmentation. If these streams are then sent over an unsecured network, anyone intercepting any one of these streams will not have obtained a single whole byte of the original data. Alternatively, if the streams are appended to one another to form a new file, the bits of each byte in the original file will not exist together at any single place in the new file. Non-symbolic fragmentation is currently under patent [GA01] and hence is a potentially commercial encryption system. The contributions of this thesis are: 1) The analysis of different variants of non-symbolic fragmentation, in terms of security and algorithm efficiency. 2) A comparison of the level of security provided, when compared to existing established cryptographic methods. 3) The refinement and expansion of existing prototype algorithms that have already been implemented using non-symbolic fragmentation. 4) The development of tools that measure the relative merits of non-symbolic fragmentation algorithms. In particular, a method is developed that relates the underlying non-symbolic fragmentation process to the research that has been done into the mathematics of card shuffling.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Symbolic Probabilistic Analysis of Off-Line Guessing

We introduce a probabilistic framework for the automated analysis of security protocols. Our framework provides a general method for expressing properties of cryptographic primitives, modeling an attacker more powerful than conventional Dolev-Yao attackers. It allows modeling equational properties of cryptographic primitives as well as property statements about their weaknesses, e.g. primitives...

متن کامل

On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol

Automatic methods developed so far for analysis of security protocols only model a limited set of cryptographic primitives (often, only encryption and concatenation) and abstract from low-level features of cryptographic algorithms. This paper is an attempt towards closing this gap. We propose a symbolic technique and a decision method for analysis of protocols based on modular exponentiation, s...

متن کامل

Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation

Automatic methods developed so far for analysis of security protocols only model a limited set of cryptographic primitives (often, only encryption and concatenation) and abstract from low-level features of cryptographic algorithms. This paper is an attempt towards closing this gap. We propose a symbolic technique and a decision method for analysis of protocols based on modular exponentiation, s...

متن کامل

Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange)

Symbolic analysis of cryptographic protocols is dramatically simpler than full-fledged cryptographic analysis. In particular, it is readily amenable to automation. However, symbolic analysis does not a priori carry any cryptographic soundness guarantees. Following recent work on cryptographically sound symbolic analysis, we demonstrate how Dolev-Yao style symbolic analysis can be used to assert...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005