On Related-Secret Pseudorandomness
نویسندگان
چکیده
Related-key attacks are attacks against constructions which use a secret key (such as a blockcipher) in which an attacker attempts to exploit known or chosen relationships among keys to circumvent security properties. Security against related-key attacks has been a subject of study in numerous recent cryptographic papers. However, most of these results are attacks on specific constructions, while there has been little positive progress on constructing related-key secure primitives. In this paper, we attempt to address the question of whether related-key secure blockciphers can be built from traditional cryptographic primitives. We develop a theoretical framework of “related-secret secure” cryptographic primitives, a class of primitives which includes related-key secure blockciphers and PRFs. We show that while a single related-secret pseduorandom bit is sufficient and necessary to create related-key secure blockciphers, hard-core bits with typical proofs are not related-secret psuedorandom. Since the pseudorandomness of hard-core bits is the essential technique known to make pseudorandomness from assumptions of simple hardness, this presents a very strong barrier to the development of provably related-key secure blockciphers based on standard hardness
منابع مشابه
Spread Spectrum, Cryptography and Information Hiding
Some short pseudo-random sequences are used in spread spectrum communications. If a cryptographically secure pseudo-random sequence is used, the communication becomes a cryptographic communication. Moreover, we propose to use another non secret communication and a secret spread spectrum communication with a high ratio to hide the secret communication.
متن کاملReusing Shares in Secret Sharing Schemes
A t w threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders is required in order to reconstruct the shared secret This paper is concerned with the re use of shares possessed by shareholders in threshold schemes We propose a simple t w threshold scheme based on the use of cryptographically strong pseudo random functions and un...
متن کاملSecret Image Sharing Using Pseudo-Random Sequence
We propose a new concept which is derived from the cryptography, the substitution of bits in the image and the visual cryptography method. Given some secret data and a set of cover images, in the proposed scheme the secret data is encrypted by the administrator, after that we select the random bit planes of the cover images using the pseudo-random sequence and modify the cover image based on th...
متن کاملSynchronization of Chaos in Lorenz System and its Application to Cryptography
A relatively new domain in the area of cryptoanalysis is the use of disorderly or chaotic systems to encrypt and decrypt data. The aim of this paper is to put forward how the basics of chaos theory using a Lorenz system can be applied to the field of cryptography. In this work, stream ciphers have been used to encrypt the data generated by a Lorenz system. Sender and receiver systems are synchr...
متن کاملDirect Use of Secret Key in Quantum Cryptography
For single-photon quantum key generation between two users, it is shown that for collective attacks the use of a shared secret key extended via a pseudo-random number generator may simultaneously enhance the security and efficiency of the cryptosystem. This effect arises from the intrinsic performance difference between quantum detectors with versus without knowledge of the key, a purely quantu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010