News

Algorithms improve how we protect our data

Algorithms improve how we protect our data
Technology
Daegu Gyeongbuk Institute of Science and Technology (DGIST) scientists in Korea have developed algorithms that more efficiently measure how difficult it would be for an attacker to guess secret keys for cryptographic systems. The approach they used was described in the journal IEEE Transactions on Information Forensics and Security and could reduce the computational complexity needed to validate encryption security.

advertisement

"Random numbers are essential for generating cryptographic information," explains DGIST computer scientist Yongjune Kim, who co-authored the study with Cyril Guyot and Young-Sik Kim. "This randomness is crucial for the security of cryptographic systems."

Cryptography is used in cybersecurity for protecting information. Scientists often use a metric, called min-entropy , to estimate and validate how good a source is at generating the random numbers used to encrypt data. Data with low entropy is easier to decipher, whereas data with high entropy is much more difficult to decode. But it is difficult to accurately estimate the min-entropy for some types of sources, leading to underestimations.

Kim and his colleagues developed an offline algorithm that estimates min-entropy based on a whole data set, and an online estimator that only needs limited data samples. The accuracy of the online estimator improves as the amount of data samples increases. Also, the online estimator does not need to store entire datasets, so it can be used in applications with stringent memory, storage and hardware constraints, like Internet-of-things devices.

"Our evaluations showed that our algorithms can estimate min-entropy 500 times faster than the current standard algorithm while maintaining estimation accuracy," says Kim.

Kim and his colleagues are working on improving the accuracy of this and other algorithms for estimating entropy in cryptography. They are also investigating how to improve privacy in machine learning applications.

Materials provided by . Note: Content may be edited for style and length.

DGIST (Daegu Gyeongbuk Institute of Science and Technology). "Algorithms improve how we protect our data: New algorithms are much better at estimating the security level of encrypted data." ScienceDaily. ScienceDaily, 4 May 2021. .

DGIST (Daegu Gyeongbuk Institute of Science and Technology). "Algorithms improve how we protect our data: New algorithms are much better at estimating the security level of encrypted data." ScienceDaily. www.sciencedaily.com/releases/2021/05/210504112608.htm (accessed May 4, 2021).

advertisement

1

Aug. 9, 2018 — Cybersecurity researchers have helped close a security vulnerability that could have allowed hackers to steal encryption keys from a popular security package by briefly listening in on unintended ...

May 31, 2017 — Whenever we need to communicate in secret, a cryptographic key is needed. For this key to work, it must consist of numbers chosen at random without any structure – just the opposite of using the ...

Mar. 28, 2017 — A prototype gadget that sends secret keys to encrypt information passed from a mobile device to a payment terminal, could help to answer public concerns around the security of contactless and ...

Sep. 8, 2016 — Random number generators are crucial to the encryption that protects our privacy and security when engaging in digital transactions such as buying products online or withdrawing cash from an ATM. For ...
Read more on sciencedaily.com
News Topics :
RELATED STORIES :
Science
In 2015, hackers infiltrated the corporate network of Ukraine s power grid and injected malicious software, which caused a massive power outage. Such cyberattacks, along with the dangers to society...
Technology
In a world first, researchers from the University of Ottawa in collaboration with Israeli scientists have been able to create optical framed knots in the laboratory that could potentially be...
Technology
A team of researchers have developed an artificial tactile sensor that mimics the ability of human skin to detect surface information, such as shapes, patterns and structures. This may be...
Technology
Duality, which builds solutions based on homomorphic encryption — a technique that encrypts an organization’s data in a way that lets it stay encrypted even as the company collaborates with...
Science
Close DGIST research team led by Professor CheolGi Kim has developed a biosensor platform which has 20 times faster detection capability than the existing biosensors using magnetic patterns resembling a...