Towards Foundations of Cryptographie: Investigation of Perfect Secrecy

نویسندگان

  • Helmut Jürgensen
  • Lynda E. Robbins
چکیده

In the spirit of Shannon's theory of secrecy systems we analyse several possible natural de nitons of the notion of perfect secrecy; these de nitions are based on arguments taken from probability theory, information theory, the theory of computational complexity, and the theory of program-size complexity or algorithmic information. It turns out that none of these de nitions models the intuitive notion of perfect secrecy completely: Some fail because a cryptographic system with weak keys can be proven to achieve perfect secrecy in their framework; others fail, because a system which, intuitively, achieves perfect secrecy cannot be proven to do so in their framework. To present this analysis we develop a general formal framework in which to express and measure secrecy aspects of information transmission systems. Our analysis leads to a clari cation of the intuition which any de nition of the notion of perfect secrecy should capture and the conjecture, that such a de nition may be impossible, that is, that only secrecy by degrees can be de ned rigorously. This analysis also leads to a clari cation of what the cryptographic literature refers to as the one-time pad. On the basis of the arguments used for its strength in the literature, one has to distinguish between two quite di erent systems: the rst kind uses randomly chosen strings of some given length; the second kind uses random strings, that is, patternless strings of some given length. The former achieves perfect secrecy in the sense of Shannon, but permits weak keys { like the all-zero key; the latter, while intuitively stronger, does not achieve perfect secrecy in any of the proposed senses. Finally, the analysis exposes the need for a formal, non-operational, but mathematical de nition of the notion of weak key.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Foundations of Cryptography: Investigation of Perfect Secrecy 1

In the spirit of Shannon's theory of secrecy systems we analyse several possible natural deenitons of the notion of perfect secrecy; these deenitions are based on arguments taken from probability theory, information theory, the theory of computational complexity, and the theory of program-size complexity or algorithmic information. It turns out that none of these deenitions models the intuitive...

متن کامل

On The Secrecy of the Cognitive Interference Channel with Channel State

In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...

متن کامل

Towards Modelling Perfect Forward Secrecy for One-round Group Key Exchange

We propose two security models for one-round group key exchange (ORGKE), which are called as g-eCKw and g-eCK-PFS. The g-eCK-PFS is a stronger variant of geCKw, which particularly formulates perfect forward secrecy for ORGKE. A new tripartite ORGKE is proposed to provide g-eCKw security without random oracles under standard assumptions, that is also more efficient than its predecessor by Li and...

متن کامل

La cryptographie du futur

Sans nous rendre compte, la cryptographie fait déjà partie de notre vie quotidienne. Notre carte bancaire, nos emails quotidiens, certains dvd, les télévisions par satellite,.... fonctionnent de façon plus ou moins sûre grâce à la cryptographie. Dans le futur, la cryptographie est appelée à jouer un rôle encore plus important, non seulement dans les nouvelles technologies, mais aussi dans la vi...

متن کامل

Perfect Secrecy in Wireless Networks

In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The present paper extends Shannon’s notion of perfect secrecy to ad hoc wireless networks of computers. All of the wireless transmissions are insecure. This paper assumes a secure base-station communicating wirelessly using...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. UCS

دوره 2  شماره 

صفحات  -

تاریخ انتشار 1996