Research output: Contribution to journal › Article › peer-review
Unconditionally secure short key ciphers based on data compression and randomization. / Ryabko, Boris.
In: Designs, Codes, and Cryptography, Vol. 91, No. 6, 06.2023, p. 2201-2212.Research output: Contribution to journal › Article › peer-review
}
TY - JOUR
T1 - Unconditionally secure short key ciphers based on data compression and randomization
AU - Ryabko, Boris
PY - 2023/6
Y1 - 2023/6
N2 - We consider the problem of constructing an unconditionally secure cipher for the case when the key length is less than the length of the encrypted message. (Unconditional security means that a computationally unbounded adversary cannot obtain information about the encrypted message without the key). In this article, we propose a cipher based on data compression and randomisation in combination with entropically-secure encryption and apply it to the following two cases: (i) the statistics of encrypted messages are known; and (ii) statistics are unknown, but messages are generated by a Markov chain with known memory (or connectivity). In both cases, the length of the secret key is negligible compared to the length of the message.
AB - We consider the problem of constructing an unconditionally secure cipher for the case when the key length is less than the length of the encrypted message. (Unconditional security means that a computationally unbounded adversary cannot obtain information about the encrypted message without the key). In this article, we propose a cipher based on data compression and randomisation in combination with entropically-secure encryption and apply it to the following two cases: (i) the statistics of encrypted messages are known; and (ii) statistics are unknown, but messages are generated by a Markov chain with known memory (or connectivity). In both cases, the length of the secret key is negligible compared to the length of the message.
KW - Cryptography
KW - Data compression
KW - Entropic security
KW - Entropically-secure symmetric encryption scheme
KW - Fitingof code
KW - Indistinguishability
KW - Information theory
KW - Perfect security
KW - Randomisation
KW - Shannon code
UR - https://www.scopus.com/record/display.uri?eid=2-s2.0-85148901858&origin=inward&txGid=1af78382cb59ea58e7ba5d7972e5db96
UR - https://www.mendeley.com/catalogue/599d7d13-515b-3dd7-b6b0-c302fcdaf343/
U2 - 10.1007/s10623-023-01195-8
DO - 10.1007/s10623-023-01195-8
M3 - Article
VL - 91
SP - 2201
EP - 2212
JO - Designs, Codes, and Cryptography
JF - Designs, Codes, and Cryptography
SN - 0925-1022
IS - 6
ER -
ID: 54930078