Combining Conventional Cryptography with Information Theoretic Security
This paper highlights security issues that can arise when incorrect assumptions are made on the capabilities of an eavesdropper. In particular, we analyze a channel model based on a split Binary Symmetric Channel (BSC). Corresponding security parameters are chosen based on this channel model, and as...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2014-12 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | This paper highlights security issues that can arise when incorrect assumptions are made on the capabilities of an eavesdropper. In particular, we analyze a channel model based on a split Binary Symmetric Channel (BSC). Corresponding security parameters are chosen based on this channel model, and assumptions on the eavesdroppers capabilities. A gradual relaxation of the restrictions on the eavesdropper's capabilities will be made, and the resulting loss of security will be quantified. An alternative will then be presented that is based on stochastic encoding and creating artificially noisy channels through the usage of private keys. The artificial channel will be constructed through a deterministic process that will be computationally intractable to reverse. |
---|---|
ISSN: | 2331-8422 |