Cosmic coding and transfer storage (COSMOCATS) for invincible key storage

Author:

Tanaka Hiroyuki K. M.

Abstract

AbstractThus far, a perfectly secure encryption key storage system doesn’t exist. As long as key storage is connected to a network system, there is always a chance that it can be cracked. Even if storage is not continually connected to a network system; it is repeatedly necessary for an individual to access storage to upload and download the data; hence there is always a loophole with every conventional encryption key storage system. By utilizing the penetrative nature of cosmic-ray muons, the COSMOCAT (Cosmic coding and transfer) technique may tackle this problem by eliminating the requirement for any network connection to data storage. COSMOCAT was invented as a post quantum key generation and distribution technique for wireless near field communication. However, in its first stage of development, COSMOCAT relied on standard comparators and Global Positioning System (GPS) or other Global Navigation Satellite Systems (GNSS) for key generation. Temporal jitters of the signals outputted from comparators and frequency fluctuations in GPS-disciplined oscillators degraded the key strength and the efficiency of both the key generation and distribution. New strategies are tested in this paper to improve these factors. As a result, the key strength and the key authenticating rate limit are respectively improved by 4 orders of magnitude and more than 5 orders of magnitude. As a consequence, it has become possible to propose a practical methodology for a new key storage and authentication strategy which has the potential to be an impregnable defense against any kind of cyber/physical attack to data storage. Practical applications of COSMOCATS-based symmetric-key cryptosystems to an electronic digital signing system, communication, and cloud storage are also discussed.

Publisher

Springer Science and Business Media LLC

Subject

Multidisciplinary

Reference57 articles.

1. National Institute of Standards and Technology, Cryptographic Key Management Issues & Challenges in Cloud Services. Retrieved from https://nvlpubs.nist.gov/nistpubs/ir/2013/nist.ir.7956.pdf (2013).

2. Prajapati, P. & Shah, P. A. Review on secure data deduplication: Cloud storage security. J. King Saud. Univ. Comput. Inf. Sci. 34, 3996–4007 (2022).

3. Lin, H.-Y. & Tzeng, W.-G. A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23, 995–1003 (2012).

4. Jing, Q. et al. Security of the Internet of Things: Perspectives and challenges. Wireless. Netw. 20, 2481–2501. https://doi.org/10.1007/s11276-014-0761-7 (2014).

5. Khowaja, S. A. et al. A secure data sharing scheme in community segmented vehicular social networks for 6G. IEEE Trans. Industr. Inform. 19, 890–899 (2022).

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3