The advancement of TCP/IP-based reliability-oriented network environment has transformed information technology from the existing independent system to a distributed processing system-based server and client model. The existing network structures suff...
The advancement of TCP/IP-based reliability-oriented network environment has transformed information technology from the existing independent system to a distributed processing system-based server and client model. The existing network structures suffer from many security problems, as they were developed considering a connection-oriented purpose to be the most important priority. To solve these security problems, various security protocols and additional functions are currently implemented and patched. In particular, the use of encryption systems has been recognized as one of the essential methods of securing the data exchanged over networks.
However, with the emergence of quantum computers, symmetric key methods in which the existing private keys are shared and encryption have been developed, and asymmetric key methods in which encryption is performed through public keys, have been identified to pose certain security risks. Some of the recently conducted studies have verified that quantum-resistant symmetric key cryptographic systems can be developed to a certain extent by increasing the key size. However, asymmetric key cryptographic systems based on the difficulties of the factorization in prime factors are vulnerable to security attacks because discrete logarithm problems can be solved instantaneously. Peter Shor, a professor at the Massachusetts Institute of Technology, USA, first proposed an algorithm to find the prime factors of a given integer. Many general cryptographic systems are based on the fact that they cannot be solved by the existing computers. However, this is no longer the case in the era of quantum computers.
The currently used encryptions systems are run in a hybrid mode in which both symmetric and asymmetric key methods are used. This hybrid mode has been devised to benefit from the fast processing speed of the symmetric key methods; the difficulty of providing a service because of the reduction in the processing speed caused by the computational complexity of an asymmetric key method is circumvented by limiting the use of asymmetric keys to the secured key exchange. To implement a secured symmetric key-based cryptographic system to circumvent the crack problem due to the emergence of quantum computers in asymmetric key exchanges, the problem of sharing a key in the most secured manner should be solved while keeping the symmetric keys in use up-to-date.
In this study, we aimed to develop a three-dimensional (3D) cube algorithm that could be used by creating an up-to-date key in a symmetric key cryptographic system to ensure data security in a quantum computer environment. More specifically, we aimed to design a solution to the secured key sharing method that could minimize the damage due to the pre-shared key (PSK) leakage by using the method of inducing the symmetric key creation based on Deep Neural Network Learning (DNN) without sharing the PSK between systems in order to securely maintain the key while creating and using the key variably through the symmetric key cryptographic system of the 3D cube algorithm.
Thus, the 3D cube algorithm developed in this study secures the confidentiality and integrity of the data transferred over a network because the amount of information obtainable by malicious attackers is small as the symmetric key used in the encryption and decryption processes is induced without exchanging the PSK, owing to the application of the Deep Neural Network Learning. To prove this, we conducted performance measurements to compare the AES-256 algorithm between the 3D cube algorithm and the encryption method used in the existing hybrid mode to verify the improved security and ensure that the proposed algorithm can be used to strengthen the security of the existing symmetric key cryptographic system.