In today’s rapid widespread of digital technologies into all live aspects
to enhance efficiency and productivity on the one hand and on the other hand
ensure customer engagement, personal data counterfeiting has become a major
concern for businesses and end-users.One
solution to ensure data security is encryption, where keys are central. There
is therefore a need to find robusts key generation implementation that is
effective, inexpensive and non-invasive for protecting and preventing data
counterfeiting. In this paper, we use the theory of electromagnetic wave
propagation to generate encryption keys.
References
[1]
Theis, T.N. and Philip Wong, H.-S. (2015) The End of Moore’s Law: A New Beginning for Information Technology. Computing in Science & Engineering, 19, 41-50. https://doi.org/10.1109/MCSE.2017.29
[2]
Huang, W., Nizam, M. H., Andonovic, I. and Tur, M. (2000) Coherentoptical CDMA (OCDMA) Systemsused for High-Capacityopticalfiber Networks-System Description, OTDMA Comparison, and OCDMA/WDMA Networking. Journal of Lightwave Technology, 18, 765-778. https://doi.org/10.1109/50.848384
[3]
Chithralekha, T., Singh, K., Ganeshvani, G. and Rajarajan, M. (2021) Code-Based Post-Quantum Cryptography. Journal Not Specified, 24 p.
[4]
Reina, J.H. (2009) Fundamentals of Information and Computation in the Realm of the Quanta. Revista de la Academia Colombiana de Ciencias Exactas, Fisicas y Naturales, 33, 201.
[5]
Joux, A. and Narayanan, A.K. (2019) Drinfeld Modules May not Be for Isogenybasedcryptography. Cryptology ePrint Archive, 16 p.
[6]
Malina, L., et al. (2021) Post-Quantum Era Privacy Protection for Intelligent Infrastructures. IEEE Access, 9, 36038-36077. https://doi.org/10.1109/ACCESS.2021.3062201
[7]
Messiah, A. (2014) Quantum Mechanics. Courier Corporation, Chelmsford.
[8]
Gagnidze, A., Iavich, M. and Iashvili, G. (2017) Analysis of Post Quantum Cryptography Use in Practice. Bulletin of the Georgian National Academy of Sciences, 11, 29-36.
[9]
Papon, P. (2017) Moore’s Law Anticipates the Future of Electronics. Futuribles, 417, 79-84. https://doi.org/10.3917/futur.417.0079
[10]
Rabia, A. (2021) électromagnétisme: Propagation des ondes électromagnétiques-Lois et équations. Propagations libre et guidée-Cours, exemples et exercices corrigés. Editions Ellipses, Paris, 348 p.
[11]
Zijlstra, T. (2020) Secure Hardware Acceleration for Post-Quantum Cryptography. Ph.D. Thesis, Université de Bretagne Sud, Lorient.