Essential Shannon Security with Keys Smaller Than the Encrypted Message

نویسنده

  • Gideon Samid
چکیده

To a cryptographer the claim that “Shannon Security was achieved with keys smaller than the encrypted message" appears unworthy of attention, much as the claim of “perpetuum mobile” is to a physicist. Albeit, from an engineering point of view solar cells which power satellites exhibit an “essential perpetuum mobile” and are of great interest. Similarly for Shannon Security, as it is explored in this article. We discuss encryption schemes designed to confound a diligent cryptanalyst who works his way from a captured ciphertext to a disappointing endpoint where more than one otherwise plausible plaintexts are found to be associated with keys that encrypt them to that ciphertext. Unlike some previous researchers who explored this equivocation as a special case of existing schemes, this approach is aimed at devising a symmetric encryption for that purpose per se.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PKCS # 1 : RSA Encryption Standard

This standard describes a method for encrypting data using the RSA public-key cryp-tosystem [1]. Its intended use is in the construction of digital signatures and digital envelopes , as described in PKCS #7 [2]: • For digital signatures, the content to be signed is first reduced to a message digest with a message-digest algorithm (such as MD5 [3]), and then an octet string containing the messag...

متن کامل

An Efficient Hybrid Approach for Secure Speech Cryptography

The ability to protect and secure information is vital to the growth of electronic commerce and to the growth of the Internet itself. Many people need or want to use communications and data security in Different areas. In this paper a hybridization technique of cryptography is proposed for the better security of the data. The message is initially encrypted with DES and the keys of DES are encry...

متن کامل

Understanding SSL

Chris Hare 134.1 What Is SSL?.................................................................... 1777 134.2 Server Certificates ........................................................... 1778 134.3 The SSL Handshake........................................................ 1778 The CLIENT-HELLO Message † The SERVERHELLO Message † The CLIENT-MASTER-KEY Message 134.4 Generating a New Master Key ....

متن کامل

A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks

Authentication is an important security mechanism for detecting forged messages in a sensor network. Each cluster head (CH) in dynamic key distribution schemes forwards a key dissemination message that contains encrypted authentication keys within its cluster to next-hop nodes for the purpose of authentication. The forwarding path of the key dissemination message strongly affects the number of ...

متن کامل

Data Encryption and Decryption Using RSA Algorithm in a Network Environment

One of the principal challenges of resource sharing on data communication network is its security. This is premised on the fact that once there is connectivity between computers sharing some resources, the issue of data security becomes critical. This paper presents a design of data encryption and decryption in a network environment using RSA algorithm with a specific message block size. The al...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2000  شماره 

صفحات  -

تاریخ انتشار 2000