Entropically secure cipher for messages generated by Markov chains with unknown statistics

05/08/2022
by   Boris Ryabko, et al.
0

In 2002, Russell and Wang proposed a definition of entropically security that was developed within the framework of secret key cryptography. An entropically-secure system is unconditionally secure, that is, unbreakable, regardless of the enemy's computing power. In 2004, Dodis and Smith developed the results of Russell and Wang and, in particular, stated that the concept of an entropy-protected symmetric encryption scheme is extremely important for cryptography, since it is possible to construct entropy-protected symmetric encryption schemes with keys much shorter than the keys. the length of the input data, which allows you to bypass the famous lower bound on the length of the Shannon key. In this report, we propose an entropy-protected scheme for the case where the encrypted message is generated by a Markov chain with unknown statistics. The length of the required secret key is proportional to the logarithm of the length of the message (as opposed to the length of the message itself for the one-time pad).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/19/2021

Using data compression and randomization to build an unconditionally secure short key cipher

We consider the problem of constructing an unconditionally secure cipher...
research
01/04/2021

Using Chaotic Stream Cipher to Enhance Data Hiding in Digital Images

The growing potential of modern communications needs the use of secure m...
research
07/19/2023

Reduction of the secret key length in the perfect cipher by data compression and randomisation

Perfect ciphers have been a very attractive cryptographic tool ever sinc...
research
06/29/2021

Mission Impossible: Securing Master Keys

Securing a secret master key is a non-trivial task, we even argue it is ...
research
02/28/2019

Enhanced Security of Symmetric Encryption Using Combination of Steganography with Visual Cryptography

Data security is required when communications over untrusted networks ta...
research
12/07/2017

One More Way to Encrypt a Message

This work describes an example of an application of a novel method for s...
research
08/01/2018

Effective Caching for the Secure Content Distribution in Information-Centric Networking

The secure distribution of protected content requires consumer authentic...

Please sign up or login with your details

Forgot password? Click here to reset