5,523 research outputs found
Symmetric encryption for error correction
The article presents applying basis of symmetric encryption (block ciphering) in the area of coding theory, a specially in detecting and correcting errors of various types: bit inversion, insertion and skipping. For the case of bit inversion, it has been formulated the conditions of guaranteed fix for a given number of errors
Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel
An instance of the framework for cryptographic security enhancement of symmetric-key encryption employing a dedicated error correction encoding is addressed. The main components of the proposal are: (i) a dedicated error correction coding and (ii) the use of a dedicated simulator of the noisy channel. The proposed error correction coding is designed for the binary erasure channel where at most one bit is erased in each codeword byte. The proposed encryption has been evaluated in the traditional scenario where we consider the advantage of an attacker to correctly decide to which of two known messages the given ciphertext corresponds. The evaluation shows that the proposed encryption provides a reduction of the considered attacker’s advantage in comparison with the initial encryption setting. The implementation complexity of the proposed encryption is considered, and it implies a suitable trade-off between increased security and increased implementation complexity
On Graph-Based Cryptography and Symbolic Computations
We have been investigating the cryptographical properties of
in nite families of simple graphs of large girth with the special colouring
of vertices during the last 10 years. Such families can be used for the
development of cryptographical algorithms (on symmetric or public key
modes) and turbocodes in error correction theory. Only few families of
simple graphs of large unbounded girth and arbitrarily large degree are
known.
The paper is devoted to the more general theory of directed graphs of
large girth and their cryptographical applications. It contains new explicit
algebraic constructions of in finite families of such graphs. We show that
they can be used for the implementation of secure and very fast symmetric
encryption algorithms. The symbolic computations technique allow us to
create a public key mode for the encryption scheme based on algebraic
graphs
Field Test of Classical Symmetric Encryption with Continuous Variable Quantum Key Distribution
We report on the design and performance of a point-to-point classical
symmetric encryption link with fast key renewal provided by a Continuous
Variable Quantum Key Distribution (CVQKD) system. Our system was operational
and able to encrypt point-to-point communications during more than six months,
from the end of July 2010 until the beginning of February 2011. This field test
was the first demonstration of the reliability of a CVQKD system over a long
period of time in a server room environment. This strengthens the potential of
CVQKD for information technology security infrastructure deployments
Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity
In the wiretap channel setting, one aims to get information-theoretic privacy
of communicated data based only on the assumption that the channel from sender
to receiver is noisier than the one from sender to adversary. The secrecy
capacity is the optimal (highest possible) rate of a secure scheme, and the
existence of schemes achieving it has been shown. For thirty years the ultimate
and unreached goal has been to achieve this optimal rate with a scheme that is
polynomial-time. (This means both encryption and decryption are proven
polynomial time algorithms.) This paper finally delivers such a scheme. In fact
it does more. Our scheme not only meets the classical notion of security from
the wiretap literature, called MIS-R (mutual information security for random
messages) but achieves the strictly stronger notion of semantic security, thus
delivering more in terms of security without loss of rate
- …