scholarly journals Perfect secrecy systems immune to spoofing attacks

2012 ◽  
Vol 11 (4) ◽  
pp. 281-289
Author(s):  
Michael Huber
Keyword(s):  
2010 ◽  
Vol 56 (12) ◽  
pp. 6490-6500 ◽  
Author(s):  
Sirin Nitinawarat ◽  
Prakash Narayan

2020 ◽  
Vol 116 (26) ◽  
pp. 260502 ◽  
Author(s):  
Valerio Mazzone ◽  
Andrea Di Falco ◽  
Al Cruz ◽  
Andrea Fratalocchi
Keyword(s):  

2012 ◽  
Vol 7 (4) ◽  
pp. 1414-1418 ◽  
Author(s):  
Won Taek Song ◽  
Jinho Choi ◽  
Jeongseok Ha

Mathematics ◽  
2020 ◽  
Vol 8 (9) ◽  
pp. 1536 ◽  
Author(s):  
Vicente Jara-Vera ◽  
Carmen Sánchez-Ávila

Security objectives are the triad of confidentiality, integrity, and authentication, which may be extended with availability, utility, and control. In order to achieve these goals, cryptobiometrics is essential. It is desirable that a number of characteristics are further met, such as cancellation, irrevocability, unlinkability, irreversibility, variability, reliability, and biometric bit-length. To this end, we designed a cryptobiometrics system featuring the above-mentioned characteristics, in order to generate cryptographic keys and the rest of the elements of cryptographic schemes—both symmetric and asymmetric—from a biometric pattern or template, no matter the origin (i.e., face, fingerprint, voice, gait, behaviour, and so on). This system uses perfect substitution and transposition encryption, showing that there exist two systems with these features, not just one (i.e., the Vernam substitution cipher). We offer a practical application using voice biometrics by means of the Welch periodogram, in which we achieved the remarkable result of an equal error rate of (0.0631, 0.9361). Furthermore, by means of a constructed template, we were able to generate the prime value which specifies the elliptic curve describing all other data of the cryptographic scheme, including the private and public key, as well as the symmetric AES key shared between the templates of two users.


2019 ◽  
Vol 5 (1) ◽  
pp. 1
Author(s):  
Geraldo Alexandre Barbosa

<p>Among the problems to guarantee secrecy for in-transit information, the difficulties involved in renewing cryptographic keys in a secure way using couriers, the perfect secrecy encryption method known as One-Time-Pad (OTP) became almost obsolete. Pure quantum key distribution (QKD) ideally offers security for key distribution and could revive OTP. However, special networks that may need optical fibers, satellite, relay stations, expensive detection equipment compared with telecom technology and the slow protocol offer powerful obstacles for widespread use of QKD.<br />Classical encryption methods flood the secure communication landscape. Many of them rely its security on historical difficulties such as factoring of large numbers - their alleged security sometimes are presented as the difficulty to brake encryption by brute force. The possibility for a mathematical breakthrough that could make factoring trivial are poorly discussed. <br /> This work proposes a solution to bring perfect secrecy to in-transit communication and without the above problems. It shows the key distribution scheme (nicknamed KeyBITS Platform) based on classical signals carrying information but that carry with them recordings of quantum noise. Legitimate users start with a shared information of the coding bases used that gives them an information advantage that allows easy signal recovery. The recorded noise protects the legitimate users and block the attacker's access.<br /> This shared information is refreshed at the end of each batch of keys sent providing the secret shared information for the next round. With encryption keys distilled from securely transmitted signals at each round OTP can be revived and at fast speeds.</p>


Sign in / Sign up

Export Citation Format

Share Document