Abstract

Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services due to computational complexity of the asymmetric key method by limiting its use to secured key exchange. To implement a secured symmetric key-based cryptographic system to circumvent the crack problem due to the emergence of quantum computers in asymmetric key exchanges, the problem of sharing a key transferred in the most secure manner should be solved while symmetric keys in use are kept up-to-date. This paper proposes a three-dimensional (3D) cube algorithm that can be used by creating the up-to-date key in a symmetric key encryption system to provide security resistance in a quantum computer environment. More specifically, it presents a solution to the secured key sharing method that can minimize the damage due to the pre-shared key (PSK) leakage. This is done by using the method of inducing the symmetric key creation based on deep neural network learning without sharing the PSK between systems to securely maintain the key while creating and using the key that is variably used through the symmetric key encryption system of the 3D cube algorithm. Thus, the proposed algorithm secures confidentiality and integrity of data transferred over a network because information that can be obtained by malicious attackers is small (because the symmetric key used in encryption and decryption is induced without exchanging the PSK with the application of deep neural network learning).

Highlights

  • Modern society has faced a rapid change in digital environments due to the Fourth Industrial Revolution

  • VERIFICATION OF THE 3D CUBE ALGORITHM IMPLEMENTATION Once the 3D CUBE is generated through the 3D CUBE algorithm, it can be found that each coordinate has its value, which is different from the array structure of the existing Rubik’s cube

  • Coordinate values must be generated as an array in the proposed 3D CUBE algorithm because a secret key is generated by using the coordinate values of the corresponding surface, and whether the coordinate values are correctly inter-operated and moved during CUBE shuffling should be verified

Read more

Summary

Introduction

Modern society has faced a rapid change in digital environments due to the Fourth Industrial Revolution. The destructive technological change throughout the whole of society is referred to as digital revolution and affects even the way individuals live. Amid this rapid change, it is necessary to analyze fundamental causes and have effective response systems by investigating application of innovative and creative technologies from diverse viewpoints, departing from existing approaches to research and development that focus on analyzing only advanced technologies. One of the most important reasons for protecting the data that are created and distributed through information technology (IT) is to deliver accurate information from sender to recipient while preventing data leakage to a malicious third party. A method to guarantee data confidentiality and integrity should be reflected in the data distribution system to create, distribute, and store data with reliable value; to this end, encryption and decryption systems should be used

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.