Towards Practical Implementation of Deep Random Secrecy

04/28/2018
by   Thibault de Valroger, et al.
0

We have formerly introduced Deep Random Secrecy, a new cryptologic technique capable to ensure secrecy as close as desired from perfection against unlimited passive eavesdropping opponents. We have also formerly introduced an extended protocol, based on Deep Random Secrecy, capable to resist to unlimited active MITM. The main limitation of those protocols, in their initial presented version, is the important quantity of information that needs to be exchanged between the legitimate partners to distill secure digits. We have defined and shown existence of an absolute constant, called Cryptologic Limit, which represents the upper-bound of Secrecy rate that can be reached by Deep Random Secrecy protocols. At last, we have already presented practical algorithms to generate Deep Randomness from classical computing resources. This article is presenting an optimization technique, based on recombination and reuse of random bits; this technique enables to dramatically increase the bandwidth performance of formerly introduced protocols, without jeopardizing the entropy of secret information. That optimization enables to envision an implementation of Deep Random Secrecy at very reasonable cost. The article also summarizes former results in the perspective of a comprehensive implementation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/31/2019

Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-middle Attack

In this work, we focus on the classical optical channel having Poissonia...
research
12/22/2017

Practical Implementation of a Deep Random Generator

We have introduced in former work the concept of Deep Randomness and its...
research
01/11/2018

Secrecy by Witness-Functions on Increasing Protocols

In this paper, we present a new formal method to analyze cryptographic p...
research
01/03/2018

Deep Random based Key Exchange protocol resisting unlimited MITM

We present a protocol enabling two legitimate partners sharing an initia...
research
08/17/2023

New Properties of Intrinsic Information and Their Relation to Bound Secrecy

The secret-key rate measures the rate at which Alice and Bob can extract...
research
06/28/2019

Can Marton Coding Alone Ensure Individual Secrecy?

For communications in the presence of eavesdroppers, random components a...
research
02/18/2020

Secure Status Updates under Eavesdropping: Age of Information-based Physical Layer Security Metrics

This letter studies the problem of maintaining information freshness und...

Please sign up or login with your details

Forgot password? Click here to reset