The Piggy Bank Cryptographic Trope
نویسنده
چکیده
This paper presents applications of the trope of the locked and sealed piggy-bank into which the secret can be easily inserted but from which it cannot be withdrawn without opening the box. We present a basic two-pass cryptographic scheme that can serve as template for a variety of implementations. Together with the sealed piggy-bank is sent a coded letter that lists and certifies the contents of the box. We show how this idea can help increase the security of cryptographic protocols for classical systems as well as those based on “single-state” systems. More specifically, we propose the use of a hashing digest (instead of the coded letter) to detect loss of key bits to the eavesdropper and use in communication systems where error correction is an important issue. Introduction The idea of locking a secret in a box and letting it be carried to the destination by an unreliable courier (Figure 1) (where it is unlocked by the recipient who has the key to unlock the box) is at the basis of most cryptographic protocols. This scheme assumes that the key has somehow been transported to the recipient in advance of the communication. The lock of the box is protected by placing a seal across it that ensures that it is not tampered with by the courier. In the case of the use of this scheme in data communication, the key may be transmitted over a side channel. If the rate at which the key is transmitted over the side channel equals the data rate, then this constitutes the unbreakable one-time pad [1].
منابع مشابه
Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography
The piggy bank idea allows one-way encryption of information that can be accessed only by authorized parties. Here we show how the piggy bank idea can be used to authenticate parties to counter man-in-the-middle (MIM) attack that can jeopardize the double-lock cryptography protocol. We call this method double-signature double lock cryptography and it can be implemented in ways that go beyond ha...
متن کاملA Piggybank Protocol for Quantum Cryptography
This paper presents a quantum mechanical version of the piggy-bank cryptography protocol. The basic piggybank cryptography idea is to use two communications: one with the encrypted message, and the other regarding the encryption transformation which the receiver must decipher first. In the quantum mechanical version of the protocol, the encrypting unitary transformation information is sent sepa...
متن کاملPiggy Bank: Experience the Semantic Web Inside Your Web Browser
The Semantic Web Initiative envisions a Web wherein information is offered free of presentation, allowing more effective exchange and mixing across web sites and across web pages. But without substantial Semantic Web content, few tools will be written to consume it; without many such tools, there is little appeal to publish Semantic Web content. To break this chicken-and-egg problem, thus enabl...
متن کاملSurvey of Key Distribution Schemes for Wireless Sensor Networks
This paper presents a survey of key distribution schemes for wireless sensor networks. This survey includes the new approach of key distribution using the piggy bank method. Different Network architectures and different key pre-distribution schemes are described. The survey includes the use of the piggy bank approach to cryptography in which part of the key is pre-distributed and the remainder ...
متن کاملSecret Sharing With Trusted Third Parties Using Piggy Bank Protocol
This paper presents a new scheme to distribute secret shares using two trusted third parties to increase security and eliminate the dependency on single trusted third party. This protocol for communication between a device and two trusted third parties uses the piggy bank cryptographic paradigm. We also present a protocol to give law enforcing agencies access to sensitive information present on...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1301.0313 شماره
صفحات -
تاریخ انتشار 2013