Re-visiting the One-Time Pad

نویسندگان

  • Nithin Nagaraj
  • Vivek Vaidya
  • Prabhakar G. Vaidya
چکیده

In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic system (One-Time Pad or OTP). It has generally been believed that the perfectly random and uncompressible OTP which is transmitted needs to have a length equal to the message length for this result to be true. In this paper, we prove that the length of the transmitted OTP actually contains useful information and could be exploited to compress the transmittedOTP while retaining perfect secrecy. The message bits can be interpreted as True/False statements about the OTP, a private object, leading to the notion of privateobject cryptography.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Check the appropriate length of metatarsal pad On the reduction of Diabetic foot ulcer mechanical parameters while walking

Background: Standard prevention and treatment strategies to decrease peak plantar pressure include a total contact insert with a metatarsal pad, but no clear guidelines exist to determine optimal length of the pad with respect to the metatarsal head. The purpose of this study was to Check the appropriate length of metatarsal pad On the reduction of Diabetic foot ulcer mechanical parameters whil...

متن کامل

Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning

Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we ...

متن کامل

بررسی تاثیر ملاقات برنامه‎ریزی شده بر شاخص‎های فیزیولوژیک بیماران بستری در بخش مراقبت‌ ویژه قلبی

  Introduction & Objective:Visiting is one of the basic needs of patients and their families while they are in coronary care units (CCUs). As the healthcare system moves toward a consumer-driven paradigm, talking about visiting hours has become a controversial and interesting topic. The aim of this research was to determine the effects of programmed visiting on physiological indexes in CCU p...

متن کامل

Leaving Against Medical Advice From In-patients Departments Rate, Reasons and Predicting Risk Factors for Re-visiting Hospital Retrospective Cohort From a Tertiary Care Hospital

Background Approximately 1% to 2% of hospitalized patients get discharged or leave from the hospital against medical advice and up to 26% in some centers. They have higher readmission rate and risk of complications than patients who receive complete care. In this study we aimed to determine the rate of leave against medical advice (...

متن کامل

A Quantum Cipher with Near Optimal Key-Recycling

Assuming an insecure quantum channel and an authenticated classical channel, we propose an unconditionally secure scheme for encrypting classical messages under a shared key, where attempts to eavesdrop the ciphertext can be detected. If no eavesdropping is detected, we can securely re-use the entire key for encrypting new messages. If eavesdropping is detected, we must discard a number of key ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2008