Completely secure practical cryptography
نویسنده
چکیده
Cryptography the art of secure communications, has been developed at least over 2500 years. Still at present, no perfectly secure as well as practically suitable classical or quantum cryptosystems exist. Statistically encoding the individual bit, here we present a practical key distribution technique which is absolutely secure both for classical and quantum keys. To achieve perfect security, noise has to be strategically introduced. Noise, a detrimental factor, which never becomes helpful anywhere in classical and quantum information theory, can be used as a gift of nature in our cryptosystem since fundamentally the coding of this cipher system does not follow the standard technique of classical and quantum information processing.
منابع مشابه
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation
In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, threshold cryptography and security engineering to implement secure auctions for practical real-world problems.
متن کاملAn unbreakable cryptosystem
The remarkably long-standing problem of cryptography is to generate completely secure key. It is widely believed that the task cannot be achieved within classical cryptography. However, there is no proof in support of this belief. We present an incredibly simple classical cryptosystem which can generate completely secure key. Cryptography is an ancient art [1]. However, in the last century cryp...
متن کاملTowards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer
Certified exchange of messages is an essential mechanism for e-commerce; the timing aspects (timeouts and timestamps) are very important for practical applications. However existing formal methods for security analysis assume simplified completely synchronous or completely asynchronous models, and cannot deal with the timing aspects of these (and other e-commerce) protocols. We present model fo...
متن کاملA Practical Approach to Expose the Public Key Infrastructure Features through Webservices
The Public Key Infrastructure (PKI) provides services that permit users to communicate in a secure manner on an unsecure network by means of digital certificates and cryptography primitives. However, in order to secure an application through cryptography and PKI, cryptographic primitives need to be implemented in the programming language used to develop the application. This raises scalability ...
متن کاملPractical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication protocols (NIMAPs) and interactive message authentication protocols (IMAPs). We provide a new proof of nonexistence of nontrivial unconditionally secure NIMAPs. This proof consists of a combinatorial counting argument ...
متن کامل