The Vernam cipher is robust to small deviations from randomness
نویسنده
چکیده
The Vernam cipher (or one-time pad) has played an important rule in cryptography because it is a perfect secrecy system. For example, if an English text (presented in binary system) X1X2... is enciphered according to the formula Zi = (Xi + Yi) mod 2, where Y1Y2... is a key sequence generated by the Bernoulli source with equal probabilities of 0 and 1, anyone who knows Z1Z2... has no information about X1X2... without the knowledge of the key Y1Y2.... (The best strategy is to guess X1X2... not paying attention to Z1Z2....) But what should one say about secrecy of an analogous method where the key sequence Y1Y2... is generated by the Bernoulli source with a small bias, say, P (0) = 0.49, P (1) = 0.51? To the best of our knowledge, there are no theoretical estimates for the secrecy of such a system, as well as for the general case where X1X2... (the plaintext) and key sequence are described by stationary ergodic processes. We consider the runningkey ciphers where the plaintext and the key are generated by stationary
منابع مشابه
Bit and Byte Level Generalized Modified Vernam Cipher Method with Feedback
In the present paper the authors have introduced a new symmetric key cryptographic method where they have clubbed both bit level and byte level generalized modified vernam cipher method with feedback. Nath et al already developed methods bit level encryption standard(BLES) Ver-I and Ver-II where they have used extensive bit level permutation, bit exchange, bit xor and bit shift encryption metho...
متن کاملSymmetric key Cryptography using two-way updated -Generalized Vernam Cipher method: TTSJA algorithm
In the present paper the authors have introduced a new updated two-way generalized vernam cipher method called TTSJA. Chatterjee et. al developed a method [1] where they used three independent methods such as MSA [2], NJJSAA [3] and modified generalized vernam cipher method. Nath et al already developed some symmetric key methods [2,3,4,5] where they have used bit manipulation method and some r...
متن کاملAnother Co*cryption Method
We consider the enciphering of a data stream while being compressed by a LZ algorithm. This has to be compared to the classical encryption after compression methods used in security protocols. Actually, most cryptanalysis techniques exploit patterns found in the plaintext to crack the cipher; compression techniques reduce these attacks. Our scheme is based on a LZ compression in which a Vernam ...
متن کاملQuantum vernam cipher
We discuss aspects of secure quantum communication by proposing and analyzing a quantum analog of the Vernam cipher (one-time-pad). The quantum Vernam cipher uses entanglement as the key to encrypt quantum information sent through an insecure quantum channel. First, in sharp contrast with the classical Vernam cipher, the quantum key can be recycled securely. We show that key recycling is intrin...
متن کاملDrone Targeted Cryptography
As flying, camera-bearing drones get smaller and lighter, they increasingly choke on the common ciphers as they interpret their commands, and send back their footage. New paradigm cryptography allows for minimum power, adjustable randomness security to step in, and enable this emerging technology to spy, follow, track, and detect. E.g.: to find survivors in a collapsed structure. We describe he...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013