Submitted:
10 August 2024
Posted:
13 August 2024
You are already at the latest version
Abstract
Keywords:
MSC: 94A60
1. Introduction
- Is it possible to develop a general concept for constructing ideal cipher systems with a predetermined minimum value of key equivocation, independent of the telecommunication environment, the probabilistic structure of the message, and without additional infrastructure for generating and distributing secret keys?
- Is it possible to apply this solution to any existing symmetric stream ciphering system without modifying it or knowing the encryption key generation algorithm, except for the length of the applied secret key?
- Ideal secrecy - Guaranteed minimum value of key equivocation, regardless of the length of the ciphertext used by the adversary.
- Autonomy - The autonomous ability to maintain a given minimum value of key equivocation by continuously refreshing keys without additional infrastructure for key generation and distribution.
- Robustness - Retains guaranteed properties regardless of the probabilistic structure of the messages.
1.1. Related Works
- Wiretap coding provides a promising environment for implementing cryptographic systems of increased security.
1.2. Paper Organization
1.3. Notations
2. Preliminaries
2.1. Wiretap Channel Model
2.2. Wiretap Polar Coding
2.3. Privacy Amplification (PA)
2.4. Ideal and Ideal Autonomous Cipher System
- Non-zero Key Equivocation: The key remains partially unknown, no matter the length of the intercepted ciphertext.
- Security over Time: The security of the system does not degrade with the amount of data encrypted and transmitted.
- Practical Key Length: The key length can be shorter than the message length, unlike a one-time pad, but must be sufficient to maintain key equivocation.
- Constant Key Equivocation: The amount of information about the key that remains unknown does not diminish with increasing ciphertext.
- Enhanced Security: Offers superior protection against extensive ciphertext analysis, maintaining key secrecy over an indefinite amount of encrypted data.
- Robust Design: Typically requires more sophisticated cryptographic techniques to ensure that key equivocation remains constant.
3. System Architecture and Security Properties of ISAR Cyphering System
-
Based on the expression (62) for the given value of the length of the secret key , we can directly obtain the required length of the polar code, i.e.,Since the length of the polar code must be a power of 2, it is necessary to correct (75) to the value
- The corrected value of the length of the polar code block (76) allows the eventual correction of the total security margin to the new valuebearing in mind the limitation
- Since all elements for ISAR system setup are available in this step, i.e., , further operation of the system takes place according to the algorithm from Table 2.
4. Security Analysis of ISAR Ciphering System
4.1. Message Attacks
4.2. Attacks on Locally Generated Random Sequences
4.3. Attacks on the Secret Key GPSN()
5. Practical Aspects
5.1. Complexity of ISAR
5.2. Integration of ISAR Ciphering System in Contemporary Information and Communication Infrastructure
- Guaranteed security margins in terms of key equivocation (ideality)
- Independence of the length of the keys from the length of the messages.
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Shannon, C.E. Communication Theory of Secrecy Systems*. Bell Syst. Tech. J. 1949, 28, 656–715. [CrossRef]
- Gunther, C. G. A universal algorithm for homophonic coding. In Workshop on the Theory and Application of Cryptographic Techniques, Springer: Berlin, Heidelberg, 1988, pp. 405-414.
- Massey, J.L. Some applications of source coding in cryptography. Eur. Trans. Telecommun. 1994, 5, 421–430. [CrossRef]
- Ryabko, B. Unconditionally secure short key ciphers based on data compression and randomization. Des. Codes Cryptogr. 2023, 91, 2201–2212. [CrossRef]
- Ryabko, B. Ya. A simply realizable ideal cryptographic system. Problems of Information Transmission 2000, 36, 84-89.
- Oggier, F.; Mihaljevic, M.J. An Information-Theoretic Security Evaluation of a Class of Randomized Encryption Schemes. IEEE Trans. Inf. Forensics Secur. 2014, 9, 158–168. [CrossRef]
- Ryabko, B.; Fionov, A. Efficient homophonic coding. IEEE Trans. Inf. Theory 1999, 45, 2083–2091. [CrossRef]
- Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A. On pseudorandom encodings. In Theory of Cryptography Conference, Springer, Cham, 2020, pp. 639-669.
- Russell, A.; Wang, H. How to fool an unbounded adversary with a short key. IEEE Trans. Inf. Theory 2006, 52, 1130–1140. [CrossRef]
- Dodis, Y.; Smith, A. Entropic security and the encryption of high entropy messages. In: Theory of Cryptography Conference, Springer, Berlin, Heidelberg, 2005, pp. 556-577.
- Ryabko, B. Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics. Entropy 2023, 25, 1406. [CrossRef]
- Juels, A.; Ristenpart, T. Honey encryption: Security beyond the brute-force bound. In Advances in Cryptology-EUROCRYPT 2014, Springer, Berlin, Heidelberg, 2014, pp. 293-310.
- Li, X.; Tang, Q.; Zhang, Z. Fooling an Unbounded Adversary with a Short Key, Repeatedly: The Honey Encryption Perspective. In 2nd Conference on Information-Theoretic Cryptography, Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021, pp. 23:1-23:21.
- Wyner, A.D. The wire-tap channel. Bell System Tech. J. 1975, 54, 1355–1387.
- Bellare, M.; Tessaro, S.; Vardy, A. Semantic security for the wiretap channel. In International cryptology conference (CRYPTO). Springer, 2012, pp. 294–311.
- Harrison, W.K.; Almeida, J.; Bloch, M.R.; McLaughlin, S.W.; Barros, J. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security. IEEE Signal Process. Mag. 2013, 30, 41–50. [CrossRef]
- Mahdavifar, H.; Vardy, A. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes. IEEE Trans. Inf. Theory 2011, 57, 6428–6443. [CrossRef]
- Sasoglu, E.; Vardy, A. A new polar coding scheme for strong security on wiretap channels. 2013 IEEE International Symposium on Information Theory (ISIT), Istanbul, Turkey; pp. 1117–1121.
- Bloch, M.; Barros, J. Physical-layer security: From information theory to security engineering; Cambridge University Press: Cambridge, UK, 2011.
- Rajagopalan, A.; Thangaraj, A.; Agrawal, S. Wiretap Polar Codes in Encryption Schemes Based on Learning with Errors Problem. 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA; pp. 1146–1150.
- Liu, S.; Hong, Y.; Viterbo, E. Unshared secret key cryptography: Achieving Shannon's ideal secrecy and perfect secrecy. 2014 IEEE Information Theory Workshop (ITW 2014), Hobart, TAS, Australia, 2014, 636-640.
- Liu, S.; et al. Unshared Secret Key Cryptography. IEEE Transactions on Wireless Communications 2014, 13, 6670-6683.
- Wang, H.; Tao, X.; Li N.; Han, Z. Polar Coding for the Wiretap Channel with Shared Key. IEEE Transactions on Information Forensics and Security 2018, 13, 1351-1360.
- Zhao, Y.; Xu, S.; Chi, H. Encrypted secure polar coding scheme for general two-way wiretap channel. IET Inf. Secur. 2019, 13, 393–403. [CrossRef]
- Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423.
- Maurer, U.M. The strong secret key rate of discrete random triples. In Communication and Cryptography — Two Sides of One Tapestry, Blahut R.E. et al. (Eds.), Boston: Kluwer Academic, 1994; Volume 276, pp.271-285.
- Maurer, U.M.; Wolf, S. Information-theoretic key agreement: From weak to strong secrecy for free. Lect. Notes Computer Science 2000, 1807, 351–368.
- Leung-Yan-Cheong, S. On a special class of wire-tap channels. IEEE Trans. Inform. Theory 1977, 23, 625–627.
- Arkan, E. A performance comparison of polar codes and Reed-Muller codes. IEEE Commun. Lett. 2008, 12, 447–449. [CrossRef]
- Arikan, E. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels. IEEE Trans. Inf. Theory 2009, 55, 3051–3073. [CrossRef]
- Bennett, C.; Brassard, G.; Crepeau, C.; Maurer, U. Generalized privacy amplification. IEEE Trans. Inf. Theory 1995, 41, 1915–1923. [CrossRef]
- Carter, J. L.; Wegman, M. N. Universal classes of hash functions. Journal of Computer and System Sciences 1979, 18, 143–154.
- Galis, M.; Milosavljević, M.; Jevremović, A.; Banjac, Z.; Makarov, A.; Radomirović, J. Secret-Key Agreement by Asynchronous EEG over Authenticated Public Channels. Entropy 2021, 23, 1327. [CrossRef]
- Radomirović, J.; Milosavljević, M.; Kovačević, B.; Jovanović, M. Privacy Amplification Strategies in Sequential Secret Key Distillation Protocols Based on Machine Learning. Symmetry 2022, 14, 2028. [CrossRef]
- Radomirović, J.; Milosavljević, M.; Banjac, Z.; Jovanović, M. Secret Key Distillation with Speech Input and Deep Neural Network-Controlled Privacy Amplification. Mathematics 2023, 11, 1524. [CrossRef]
- Korada, S. B. Polar Codes for Channel and Source Coding, Ph.D. Thesis, Ecole Polytechnique Federale de Lausanne, Lausanne, Switzerland, 2009.
- Kim, Y.-S.; Kim, J.-H.; Kim, S.-H. A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding. IEEE Commun. Lett. 2014, 18, 937–940. [CrossRef]
- Cover, T.M.; Thomas, J.A. Elements of Information Theory, 2nd ed., NJ: John Wiley & Sons, Hoboken, 2006.
- Biondi, F.; Given-Wilson, T.; Legay, A. Attainable unconditional security for shared-key cryptosystems. Inf. Sci. 2016, 369, 80–99. [CrossRef]
- Massey, J. L. Applied Digital Information Theory II, Lecture notes. Available online: https://www.isiweb.ee.ethz.ch/archive/massey_scr/ (accessed on 31 July 2024).
- Tal, I.; Vardy, A. How to construct polar codes. IEEE Transactions on Information Theory 2013, 59, 6562–6582.
- Mori, R.; Tanaka, T. Performance of Polar Codes with the Construction using Density Evolution. IEEE Commun. Lett. 2009, 13, 519–521. [CrossRef]
- Trifonov, P. Efficient Design and Decoding of Polar Codes. IEEE Trans. Commun. 2012, 60, 3221–3227. [CrossRef]
- Unkašević, T.; Banjac, Z.; Milosavljević, M. A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments. Sensors 2019, 19, 5322. [CrossRef]
- Tsurumaru, T.; Hayashi, M. Dual Universality of Hash Functions and Its Applications to Quantum Cryptography. IEEE Trans. Inf. Theory 2013, 59, 4700–4717. [CrossRef]
- Hayashi, M.; Tsurumaru, T. More Efficient Privacy Amplification With Less Random Seeds via Dual Universal Hash Function. IEEE Trans. Inf. Theory 2016, 62, 2213–2232. [CrossRef]










Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).