Cryptographic Security of Individual Instances

被引:0
|
作者
Antunes, L. [1 ]
Laplante, S. [2 ]
Pinto, A. [1 ]
Salvador, L. [1 ]
机构
[1] Univ Porto, Dept Ciencias Computadores, Oporto, Portugal
[2] Univ Paris 11, LRI, Orsay, France
来源
关键词
Perfect secrecy; Kolmogorov complexity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are two principal notions of security for cryptographic systems. For a few systems, they can be proven to have perfect secrecy against an opponent with unlimited computational power, in terms of information theory. However, the security of most systems, including public key cryptosystems, is based on complexity theoretic assumptions. In both cases there is an implicit notion of average-case analysis. In the case of conditional security, the underlying assumption is usually average-case, not worst case hardness. And for unconditional security, entropy itself is an average case notion of encoding length. Kolmogorov complexity (the size of the smallest program that generates a string) is a rigorous measure of the amount of information, or randomness, in an individual string x. By considering the time-bounded Kolmogorov complexity (program limited to run in time t(vertical bar x vertical bar)) we can take into account the computational difficulty of extracting information. We present a new notion of security based on Kolmogorov complexity. The first goal is to provide a formal definition of what it means for an individual instance to be secure. The second goal is to bridge the gap between information theoretic security, and computational security, by using time-bounded Kolmogorov complexity. In this paper, we lay the groundwork of the study of cryptosystems from the point of view of security of individual instances by considering three types of information-theoretically secure cryptographic systems: cipher systems (such as the one-time pad), threshold secret sharing, and authentication schemes.
引用
收藏
页码:195 / +
页数:2
相关论文
共 50 条
  • [21] A cryptographic model for better information security
    Kumar, Sunil
    Kumar, Manish
    Budhiraja, Rajat
    Das, M. K.
    Singh, Sanjeev
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 : 123 - 138
  • [22] The Price of Active Security in Cryptographic Protocols
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [23] Program Analysis of Cryptographic Implementations for Security
    Rahaman, Sazzadur
    Yao, Danfeng
    2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, : 61 - 68
  • [24] Improving the Security of Cryptographic Protocol Standards
    Basin, David
    Cremers, Cas
    Miyazaki, Kunihiko
    Radomirovic, Sasa
    Watanabe, Dai
    IEEE SECURITY & PRIVACY, 2015, 13 (03) : 24 - 31
  • [25] Security and Composition of Multiparty Cryptographic Protocols
    Ran Canetti
    Journal of Cryptology, 2000, 13 : 143 - 202
  • [26] METHODOLOGY FOR ASSESSING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    Nesterenko, A. Yu
    Semenov, A. M.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2022, (56): : 33 - 82
  • [27] Security of biased sources for cryptographic keys
    Mihailescu, P
    CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 287 - 302
  • [28] ENHANCEMENT OF SECURITY USING CRYPTOGRAPHIC TECHNIQUES
    Saini, Natasha
    Pandey, Nitin
    Singh, Ajeet Pal
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [29] Almost security of cryptographic Boolean functions
    Kurosawa, K
    Matsumoto, R
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (11) : 2752 - 2761
  • [30] The Price of Active Security in Cryptographic Protocols
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 184 - 215