Approaching Shannon's One-Time Pad: Metrics, Architectures, and Enabling Technologies

03/11/2023
by   Li Sun, et al.
0

The rapid development of advanced computing technologies such as quantum computing imposes new challenges to current wireless security mechanism which is based on cryptographic approaches. To deal with various attacks and realize long-lasting security, we are in urgent need of disruptive security solutions. In this article, novel security transmission paradigms are proposed to approach Shannon's one-time pad perfect secrecy. First, two metrics, termed as Degree-of-Approaching (DoA) and Degree-of-Synchronous-Approaching (DoSA), are developed to characterize the closeness between the achieved security strength and perfect secrecy. These two metrics also serve as a guideline for secure transmission protocol design. After that, we present two paths towards Shannon's one-time pad, i.e., an explicit-encryption based approach and an implicit-encryption based approach. For both of them, we discuss the architecture design, enabling technologies, as well as preliminary performance evaluation results. The techniques presented in this article provide promising security-enhancing solutions for future wireless networks.

READ FULL TEXT
research
01/11/2018

Generalized Quantum Shannon Impossibility for Quantum Encryption

The famous Shannon impossibility result says that any encryption scheme ...
research
07/31/2022

Secure Email Transmission Protocols – A New Architecture Design

During today's digital age, emails have become a crucial part of communi...
research
06/14/2020

Survey on Physical Layer Security for 5G Wireless Networks

Physical layer security is a promising approach that can benefit traditi...
research
10/10/2019

Research on a Hybrid System With Perfect Forward Secrecy

The rapid development of computer technology will be the whole world as ...
research
01/16/2019

A wireless secure key distribution system with no couriers: a One-Time-Pad Revival

Among the problems to guarantee secrecy for in-transit information, the ...
research
01/05/2018

Secrecy by Witness-Functions under Equational Theories

In this paper, we use the witness-functions to analyze cryptographic pro...
research
09/23/2021

Encryption Device Based on Wave-Chaos for Enhanced Physical Security of Wireless Wave Transmission

We introduce an encryption device based on wave-chaos to enhance the phy...

Please sign up or login with your details

Forgot password? Click here to reset