Reduction of the secret key length in the perfect cipher by data compression and randomisation

07/19/2023
by   Boris Ryabko, et al.
0

Perfect ciphers have been a very attractive cryptographic tool ever since C. Shannon described them. Note that, by definition, if a perfect cipher is used, no one can get any information about the encrypted message without knowing the secret key. We consider the problem of reducing the key length of perfect ciphers, because in many applications the length of the secret key is a crucial parameter. This paper describes a simple method of key length reduction. This method gives a perfect cipher and is based on the use of data compression and randomisation, and the average key length can be made close to Shannon entropy (which is the key length limit). It should be noted that the method can effectively use readily available data compressors (archivers).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/19/2021

Using data compression and randomization to build an unconditionally secure short key cipher

We consider the problem of constructing an unconditionally secure cipher...
research
05/08/2022

Entropically secure cipher for messages generated by Markov chains with unknown statistics

In 2002, Russell and Wang proposed a definition of entropically security...
research
01/17/2019

One-Shot Perfect Secret Key Agreement for Finite Linear Sources

We consider a non-asymptotic (one-shot) version of the multiterminal sec...
research
11/14/2018

A framework for covert and secret key expansion over quantum channels

Covert and secret quantum key distribution aims at generating informatio...
research
09/16/2023

Private Variable-Length Coding with Sequential Encoder

A multi-user private data compression problem is studied. A server has a...
research
10/07/2021

Optical secret sharing with cascaded metasurface holography

Secret sharing is a well-established cryptographic primitive for storing...
research
11/21/2022

Koopman interpretation and analysis of a public-key cryptosystem: Diffie-Hellman key exchange

The security of public-key cryptosystems relies on computationally hard ...

Please sign up or login with your details

Forgot password? Click here to reset