Error Correcting Codes, Block Designs, Perfect Secrecy and Finite Fields

被引:0
|
作者
Aiden A. Bruen
David L. Wehlau
Mario Forcinito
机构
[1] University of Calgary,Department of Mathematics
[2] Royal Military College of Canada,Department of Mathematics and Statistics
[3] SUR CiES Inc.,undefined
来源
关键词
11T71; 81P68; finite fields; hash functions; quantum cryptography; secret key distillation;
D O I
暂无
中图分类号
学科分类号
摘要
The ancient difficulty for establishing a common cryptographic secret key between two communicating parties Alice and Bob is nicely summarized by the Catch-22 dictum of S.J. Lomonaco [1999], to wit: “in order to communicate in secret one must first communicate in secret”. In other words, to communicate in secret, Alice and Bob must already have a shared secret key. In this paper we analyse an algorithm for establishing such a common secret key by public discussion, under the modest and practical requirement that Alice and Bob are initially in possession of keys \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$A$\end{document} and \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$B$\end{document}, respectively, of a common length \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$N$\end{document} which are not necessarily equal but are such that the mutual information \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$I(A,B)$\end{document} is non-zero. This assumption is tantamount to assuming only that the corresponding statistical variables are correlated. The common secret key distilled by the algorithm will enjoy perfect secrecy in the sense of Shannon. The method thus provides a profound generalization of traditional symmetric key cryptography and applies also to quantum cryptography. Here, by purely elementary methods, we give a rigorous proof that the method proposed by Bennett, Bessette, Brassard, Salvail, and Smolin will in general converge to a non-empty common key under moderate assumptions on the choice of block lengths provided the initial bit strings are sufficiently long. Full details on the length requirements are presented. Furthermore, we consider the question of which block lengths should be chosen for optimal performance with respect to the length of the resulting common key. A new and fundamental aspect of this paper is the explicit utilization of finite fields and error-correcting codes both for checking equality of the generated keys and, later, for the construction of various hash functions. Traditionally this check has been done by performing a few times a comparison of the parity of a random subset of the bits. Here we give a much more efficient procedure by using the powerful methods of error-correcting codes. More general situations are treated in Section 8.
引用
收藏
页码:253 / 278
页数:25
相关论文
共 50 条
  • [1] Error correcting codes, block designs, perfect secrecy and finite fields
    Bruen, Aiden A.
    Wehlau, David L.
    Forcinito, Mario
    [J]. ACTA APPLICANDAE MATHEMATICAE, 2006, 93 (1-3) : 253 - 278
  • [2] ERROR-CORRECTING CODES AND BLOCK DESIGNS WITH FEEDBACK
    BERLEKAM.ER
    [J]. SIAM REVIEW, 1965, 7 (04) : 605 - &
  • [3] AN APPLICATION OF INCOMPLETE BLOCK DESIGNS TO CONSTRUCTION OF ERROR CORRECTING CODES
    SMITH, KJC
    [J]. ANNALS OF MATHEMATICAL STATISTICS, 1969, 40 (05): : 1865 - &
  • [4] PHASED ERROR CORRECTING PERFECT CODES
    SHARMA, BD
    KAUR, B
    [J]. JOURNAL OF CYBERNETICS, 1977, 7 (3-4): : 227 - 247
  • [5] Narain CFTs and error-correcting codes on finite fields
    Yahagi, Shinichiro
    [J]. JOURNAL OF HIGH ENERGY PHYSICS, 2022, 2022 (08)
  • [6] Narain CFTs and error-correcting codes on finite fields
    Shinichiro Yahagi
    [J]. Journal of High Energy Physics, 2022
  • [7] Error-correcting codes in attenuated space over finite fields
    Gao, You
    Wang, Gang
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2015, 33 : 103 - 117
  • [8] Block error correcting codes using finite-field wavelet transforms
    Fekri, F
    McLaughlin, SW
    Mersereau, RM
    Schafer, RW
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (03) : 991 - 1004
  • [9] Cellular Automata Based Byte Error Correcting Codes over Finite Fields
    Koroglu, Mehmet E.
    Siap, Irfan
    Akin, Hasan
    [J]. FIRST INTERNATIONAL CONFERENCE ON ANALYSIS AND APPLIED MATHEMATICS (ICAAM 2012), 2012, 1470 : 183 - 186
  • [10] Error Correcting Codes via Reversible Cellular Automata Over Finite Fields
    Koroglu, Mehmet E.
    Siap, Irfan
    Akin, Hasan
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2014, 39 (03) : 1881 - 1887