Using Reconfigurable Multi-Valued Logic Operators to Build a New Encryption Technology †
Abstract
:1. Introduction
2. Configurable Encryption Technology (CET)
2.1. Massive Encryptor/Decryptor Pairs Based on RQLO Typical Structure
2.2. Generalized Key and Generalized Key Source Data
2.3. Generalized Key Source Data Prestorage and Appointment Codes
3. Basic Structure of Configurable Encryption Chip
3.1. AC Negotiation Process with CEC
- (1)
- Party A, who requests to end the communication, sends AC to the other party B.
- (2)
- B saves the received AC and returns it to sender A.
- (3)
- A receives the returned AC and compares it with the saved AC via a comparator (see Figure 2). If the returned AC and the saved AC are the same, a signal of “AC negotiation success” is given.
- (4)
- If the returned AC fails to match the saved AC, A sends the saved AC again.
- (5)
- If the returned AC keeps failing to match the saved AC 8 times in a row, a signal of “AC negotiation failure” is given.
4. Experiment
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Blahut, R.E. Cryptography and Secure Communication; Cambridge University Press: Cambridge, UK, 2014. [Google Scholar]
- Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C; John Wiley & Sons: Hoboken, NJ, USA, 2007. [Google Scholar]
- Zhang, B.; Jin, C. Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function. Sci. China Inf. Sci. 2012, 55, 2161–2170. [Google Scholar] [CrossRef]
- Acar, A.; Aksu, H.; Uluagac, A.S.; Conti, M. A survey on homomorphic encryption schemes: Theory and implementation. ACM Comput. Surv. (Csur) 2018, 51, 1–35. [Google Scholar] [CrossRef]
- Jin, Y.; Wang, H.; Ouyang, S.; Zhou, Y.; Shen, Y.; Peng, J.; Principles, X.L. Structures, and implementation of reconfigurable ternary optical processors. Sci. China Inf. Sci. 2011, 54, 2236–2246. [Google Scholar] [CrossRef]
- Wang, H.; Song, K. Simulative method for the optical processor reconfiguration on a dynamically reconfigurable optical platform. Appl. Opt. 2012, 51, 167–175. [Google Scholar] [CrossRef] [PubMed]
- Jin, Y.; Ouyang, S.; Pan, Z.; Wang, Y.; Shen, Y.; Peng, J.; Zhou, S.; Liu, Y.; Chen, X. Many-Bit, Groupable, Reconfigurable Multi-Valued, Electronic Operator and Its Construction Method. China Invention Patent 201811567284.7, 20 December 2018. The Patent Cooperation Treaty (PCT/CN2019/070318), 4 January 2019. (In Chinese). [Google Scholar]
- Wang, H.; Wu, Y.; Ouyang, S.; Chen, X.; Shen, Y.; Jin, Y. The design and implementation of reconfigurable quaternary logic processor. In Proceedings of the 22nd International Conference on Parallel and Distributed Computing, Applications and Technologies, Guangzhou, China, 17–19 December 2021; pp. 142–149. [Google Scholar]
- Wang, H.; Jin, Y.; Jin, S.; Wang, Y. An Encryption and Decryption Method, Device and Communication System Thereof. China Invention Patent 202110801365.4, 15 July 2021. The Patent Cooperation Treaty (PCT/CN2021/110681), 4 August 2021. (In Chinese). [Google Scholar]
- Baba, Y.; Miyamoto, A.; Homma, N.; Aoki, T. Multiple-valued constant-power adder for cryptographic processors. In Proceedings of the 39th International Symposium on Multiple-Valued Logic, Naha, Japan, 21–23 May 2009; pp. 239–244. [Google Scholar]
- Homma, N.; Saito, K.; Aoki, T. Formal design of multiple-valued arithmetic algorithms over Galois fields and its application to cryptographic processor. In Proceedings of the 2012 IEEE 42nd International Symposium on Multiple-Valued Logic, Victoria, BC, Canada, 14–16 May 2012; pp. 110–115. [Google Scholar]
- Sokolov, A.; Zhdanov, O. Prospects for the application of many-valued logic functions in cryptography. In Proceedings of the International Conference on Computer Science, Engineering and Education Applications (ICCSEEA 2018), Kiev, Ukraine, 18–20 January 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 331–339. [Google Scholar]
- Zakaria, S.B.; Navi, K. Image encryption and decryption using exclusive-or based on ternary value logic. Comput. Electr. Eng. 2022, 101, 108021. [Google Scholar] [CrossRef]
- Ali, M.A.; Emran, A.; Habib, M.A.; Nadim, M.; Kusaka, T.; Nogami, Y. Pseudo random ternary sequence and its autocorrelation property over finite field. Int. J. Comput. Netw. Inf. Secur. 2017, 9, 54–63. [Google Scholar] [CrossRef]
- Bykovsky, A.Y. A multiple-valued logic for implementing a random oracle and the position-based cryptography. J. Russ. Laser Res. 2019, 40, 173–183. [Google Scholar] [CrossRef]
- Yan, J.; Jin, Y.; Zuo, K. Decrease-radix design principle for carrying/borrowing free multi-valued and application in ternary optical computer. Sci. China Ser. F Inf. Sci. 2008, 51, 1415–1426. [Google Scholar] [CrossRef]
B | B0(00) | B1(01) | B2(10) | B3(11) | |
---|---|---|---|---|---|
A | |||||
A0 (00) | C00 | C01 | C02 | C03 | |
A1 (01) | C10 | C11 | C12 | C13 | |
A2 (10) | C20 | C21 | C22 | C23 | |
A3 (11) | C30 | C31 | C32 | C33 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, H.; Ouyang, S.; Chen, X.; Jin, Y. Using Reconfigurable Multi-Valued Logic Operators to Build a New Encryption Technology. Comput. Sci. Math. Forum 2023, 8, 99. https://doi.org/10.3390/cmsf2023008099
Wang H, Ouyang S, Chen X, Jin Y. Using Reconfigurable Multi-Valued Logic Operators to Build a New Encryption Technology. Computer Sciences & Mathematics Forum. 2023; 8(1):99. https://doi.org/10.3390/cmsf2023008099
Chicago/Turabian StyleWang, Hongjian, Shan Ouyang, Xunlei Chen, and Yi Jin. 2023. "Using Reconfigurable Multi-Valued Logic Operators to Build a New Encryption Technology" Computer Sciences & Mathematics Forum 8, no. 1: 99. https://doi.org/10.3390/cmsf2023008099
APA StyleWang, H., Ouyang, S., Chen, X., & Jin, Y. (2023). Using Reconfigurable Multi-Valued Logic Operators to Build a New Encryption Technology. Computer Sciences & Mathematics Forum, 8(1), 99. https://doi.org/10.3390/cmsf2023008099