Cryptographic Security of Individual Instances

被引:0
|
作者
Antunes, L. [1 ]
Laplante, S. [2 ]
Pinto, A. [1 ]
Salvador, L. [1 ]
机构
[1] Univ Porto, Dept Ciencias Computadores, Oporto, Portugal
[2] Univ Paris 11, LRI, Orsay, France
来源
关键词
Perfect secrecy; Kolmogorov complexity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are two principal notions of security for cryptographic systems. For a few systems, they can be proven to have perfect secrecy against an opponent with unlimited computational power, in terms of information theory. However, the security of most systems, including public key cryptosystems, is based on complexity theoretic assumptions. In both cases there is an implicit notion of average-case analysis. In the case of conditional security, the underlying assumption is usually average-case, not worst case hardness. And for unconditional security, entropy itself is an average case notion of encoding length. Kolmogorov complexity (the size of the smallest program that generates a string) is a rigorous measure of the amount of information, or randomness, in an individual string x. By considering the time-bounded Kolmogorov complexity (program limited to run in time t(vertical bar x vertical bar)) we can take into account the computational difficulty of extracting information. We present a new notion of security based on Kolmogorov complexity. The first goal is to provide a formal definition of what it means for an individual instance to be secure. The second goal is to bridge the gap between information theoretic security, and computational security, by using time-bounded Kolmogorov complexity. In this paper, we lay the groundwork of the study of cryptosystems from the point of view of security of individual instances by considering three types of information-theoretically secure cryptographic systems: cipher systems (such as the one-time pad), threshold secret sharing, and authentication schemes.
引用
收藏
页码:195 / +
页数:2
相关论文
共 50 条
  • [41] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [42] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    Science in China(Series F:Information Sciences), 2004, (02) : 199 - 220
  • [43] PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD SECURITY
    Vennela, G. Sai
    Varun, N. Venkata
    Neelima, N.
    Priya, L. Sai
    Yeswanth, J.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 273 - 279
  • [44] A Review of Cloud Security Based on Cryptographic Mechanisms
    Abd, Sura Khalil
    Al-Haddad, S. A. R.
    Hashim, Fazirulhisyam
    Abdullah, Azizol
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 106 - 111
  • [45] Standardization of Cryptographic Techniques - The Influence of the Security Agencies
    Klein, Gunnar O.
    HISTORY OF NORDIC COMPUTING 4, 2015, 447 : 321 - 327
  • [46] A Comparative Study of Cryptographic Algorithms for Cloud Security
    Yusufzai, Asifkhan
    Ranpara, Ripal
    Vora, Mital
    Kumbharana, C. K.
    EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 409 - 415
  • [47] An Advance Cryptographic Solutions in Cloud Computing Security
    Ul Abedin, Zain
    Guan, Zhitao
    Arif, Asad Ullah
    Anwar, Usman
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET), 2019,
  • [48] Performance and Security Tradeoffs in Cryptographic Hash Functions
    Almuhammadi, Sultan
    Bawazeer, Omar Mohammed
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2020, 12 (04) : 37 - 51
  • [49] Implementing Cryptographic Pairings at Standard Security Levels
    Enge, Andreas
    Milan, Jerome
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, 2014, 8804 : 28 - +
  • [50] Safe: Cryptographic Algorithms and Security Principles Gamification
    Al Kaabi, Latifa
    Al Ketbi, Wadha
    Al Khoori, Aysha
    Al Shamsi, Maitha
    Alrabaee, Saed
    PROCEEDINGS OF THE 2022 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON 2022), 2022, : 1169 - 1178