Perfect Secrecy and Provable Security
ثبت نشده
چکیده
Everyone knows that the one-time pad provides perfect security. But what does this mean? In this chapter, we make this concept precise. Also, we know that it is very difficult in practice to produce a truly random key for a one-time pad. In Section 2, we show quantitatively how biases in producing the key affect the security of the encryption. The topics of this chapter are part of the subject known as Provable Security. Rather than relying on intuition that a cryptosystem is secure, the goal is to isolate exactly what fundamental problems are the basis for its security. The result of Section 2 shows that the security of a one-time pad is based on the quality of the random number generator. In Section 7.5, we show that the security of the ElGamal Public key cryptosystem reduces to the difficulty of the Computational Diffie-Hellman problem, one of the fundamental problems related to discrete logarithms. In Section 8.6, we use the Random Oracle Model to relate the security of a simple cryptosystem to the non-invertibility of a oneway function. Since these fundamental problems have been well studied, it is easier to gauge the security levels of the cryptosystems.
منابع مشابه
Information-theoretic Cryptography
In 1949, Shannon published the paper ”Communication theory of secrecy systems”. This constituted a foundational treatment and analysis of encryption systems. He transferred the methods of information theory, originally developed as a mathematical model for communication over ”noisy” channels to the setting of cryptosystems. We give a brief introduction into his most outstanding ideas, such as t...
متن کاملAuthenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
The article proposes a provably secure authenticated multiple key establishment protocol for Wireless Sensor Network. Security of the protocol is based on the computational infeasiblity of solving Elliptic Curve Discrete Logarithm Problem and Computational Diffie-Hellman Problem on Bilinear Pairing. User authentication is a one of the most challenging security requirement in wireless sensor net...
متن کاملProvably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
This paper presents an anonymous authentication scheme for roaming service in global mobility networks, in which the foreign agent cannot obtain the identity information of the mobile user who is sending the roaming request. In addition, the home agent does not have to maintain any verification table for authenticating the mobile user. We give formal analyses to show that our proposed scheme sa...
متن کاملTowards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy
Just Fast Keying (JFK) is a simple, efficient and secure key exchange protocol proposed by Aiello et al. (ACM TISSEC, 2004). JFK is well known for its novel design features, notably its resistance to denialof-service (DoS) attacks. Using Meadows’ cost-based framework, we identify a new DoS vulnerability in JFK. The JFK protocol is claimed secure in the Canetti-Krawczyk model under the Decisiona...
متن کاملSecrecy on the Physical Layer in Wireless Networks
This chapter provides a comprehensive state-of-the-art description of the emerging field of physical layer security. We will consider wireless security from an information theoretic view, which allows us to talk about provable secrecy and to derive ultimate secrecy limits. Our main focus is on the optimization of transmit strategies and resource allocation schemes under secrecy constraints. We ...
متن کامل