Towards Foundations of Cryptography: Investigation of Perfect Secrecy 1

نویسنده

  • L. Robbins
چکیده

In the spirit of Shannon's theory of secrecy systems we analyse several possible natural deenitons of the notion of perfect secrecy; these deenitions are based on arguments taken from probability theory, information theory, the theory of computational complexity, and the theory of program-size complexity or algorithmic information. It turns out that none of these deenitions models the intuitive notion of perfect secrecy completely: Some fail because a cryptographic system with weak keys can be proven to achieve perfect secrecy in their framework; others fail, because a system which, intuitively, achieves perfect secrecy cannot be proven to do so in their framework. To present this analysis we develop a general formal framework in which to express and measure secrecy aspects of information transmission systems. Our analysis leads to a clariication of the intuition which any deenition of the notion of perfect secrecy should capture and the conjecture, that such a deenition may be impossible, that is, that only secrecy by degrees can be deened rigorously. This analysis also leads to a clariication of what the cryptographic literature refers to as the one-time pad. On the basis of the arguments used for its strength in the literature, one has to distinguish between two quite diierent systems: the rst kind uses randomly chosen strings of some given length; the second kind uses random strings, that is, patternless strings of some given length. The former achieves perfect secrecy in the sense of Shannon, but permits weak keys { like the all-zero key; the latter, while intuitively stronger, does not achieve perfect secrecy in any of the proposed senses. Finally, the analysis exposes the need for a formal, non-operational, but mathematical deenition of the notion of weak key.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Foundations of Cryptographie: Investigation of Perfect Secrecy

In the spirit of Shannon's theory of secrecy systems we analyse several possible natural de nitons of the notion of perfect secrecy; these de nitions are based on arguments taken from probability theory, information theory, the theory of computational complexity, and the theory of program-size complexity or algorithmic information. It turns out that none of these de nitions models the intuitive...

متن کامل

Lecture 1 : Perfect Secrecy and Statistical Authentication

• Definition of perfect secrecy • One-time pad and optimality (Shannon's theorem) • Definition of statistical one-time MAC and construction. Historically, cryptography was treated as a practical problem with practical applications. Many of these schemes were insecure due to a lack of a mathematical foundation combined with no understanding of desirable properties in cryptography systems. Howeve...

متن کامل

Towards Modelling Perfect Forward Secrecy for One-round Group Key Exchange

We propose two security models for one-round group key exchange (ORGKE), which are called as g-eCKw and g-eCK-PFS. The g-eCK-PFS is a stronger variant of geCKw, which particularly formulates perfect forward secrecy for ORGKE. A new tripartite ORGKE is proposed to provide g-eCKw security without random oracles under standard assumptions, that is also more efficient than its predecessor by Li and...

متن کامل

Perfect Secrecy in Wireless Networks

In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The present paper extends Shannon’s notion of perfect secrecy to ad hoc wireless networks of computers. All of the wireless transmissions are insecure. This paper assumes a secure base-station communicating wirelessly using...

متن کامل

Lecture 1 : Crypto Overview , Perfect Secrecy , One - time Pad

We overview the aims and the philosophy of modern cryptography. We exemplify this approach with the first shot at a definition of encryption scheme security, which we will develop later on in this class. We then give a classic definition given by Claude Shannon of perfect secrecy for an encryption. We show that various classic ciphers fail to satisfy this definition, but we also show a cipher c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996