Results 1 to 10 of about 2,151 (95)

Refinements and Extensions of Ziv’s Model of Perfect Secrecy for Individual Sequences [PDF]

open access: yesEntropy
We refine and extend Ziv’s model and results regarding perfectly secure encryption of individual sequences. According to this model, the encrypter and the legitimate decrypter share a common secret key that is not shared with the unauthorized ...
Neri Merhav
doaj   +2 more sources

From perfect secrecy to perfect safety & security: Cryptography-based analysis of endogenous security

open access: yesSecurity and Safety, 2023
In this paper, we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.
Jin Liang, Hu Xiaoyan, Wu Jiangxing
doaj   +1 more source

Novel Noise Injection Scheme to Guarantee Zero Secrecy Outage under Imperfect CSI

open access: yesEntropy, 2023
The paper proposes a novel artificial noise (AN) injection strategy in multiple-input single-output multiple-antenna-eavesdropper (MISOME) systems under imperfect channel estimation at the legitimate channel to achieve zero secrecy outage probability ...
Hien Q. Ta, Lam Cao, Hoon Oh
doaj   +1 more source

On the Beneficial Role of a Finite Number of Scatterers for Wireless Physical Layer Security

open access: yesIEEE Access, 2020
We show that for a legitimate communication under multipath quasi-static fading with a reduced number of scatterers, it is possible to achieve perfect secrecy even in the presence of a passive eavesdropper for which no channel state information (CSI) is ...
Pablo Ramirez-Espinosa   +2 more
doaj   +1 more source

Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone

open access: yesSensors, 2021
Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability.
Yongho Ko   +5 more
doaj   +1 more source

XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era

open access: yesCryptography, 2023
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj   +1 more source

Counter Mode of the Shannon Block Cipher Based on MPF Defined over a Non-Commuting Group

open access: yesMathematics, 2022
In this paper, we present a counter mode of a Shannon block cipher based on the matrix power function. We make use of the matrix power function to define a single round symmetric cipher.
Aleksejus Mihalkovich   +2 more
doaj   +1 more source

ADDING PERFECT FORWARD SECRECY TO KERBEROS

open access: yesJournal of Engineering, 2010
Kerberos system is a powerful and widely implemented authentication system. Despite this fact it has several problems such as the vulnerability to dictionary attacks which is solved with the use of public key cryptography.
Wameedh Nazar Flayyih
doaj   +1 more source

Robust Secure Authentication and Data Storage with Perfect Secrecy

open access: yesCryptography, 2018
We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF), respectively, from an information theoretical point of view.
Sebastian Baur, Holger Boche
doaj   +1 more source

Perfect Secrecy System Based on Chaotic Key Generator

open access: yesIraqi Journal of Information & Communication Technology, 2018
Shannon defines perfect secrecy for a cryptographic system as such a cryptographic system in which the ciphertext yields no possible information about the plaintext.
Mahmood Khalel Ibrahem
doaj   +1 more source

Home - About - Disclaimer - Privacy