International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Essential Shannon Security with Keys Smaller Than the Encrypted Message

Authors:
Gideon Samid
Download:
URL: http://eprint.iacr.org/2000/059
Search ePrint
Search Google
Abstract: To a cryptographer the claim that ?Shannon Security was achieved with keys smaller than the encrypted message" appears unworthy of attention, much as the claim of ?perpetuum mobile? is to a physicist. Albeit, from an engineering point of view solar cells which power satellites exhibit an ?essential perpetuum mobile? and are of great interest. Similarly for Shannon Security, as it is explored in this article. We discuss encryption schemes designed to confound a diligent cryptanalyst who works his way from a captured ciphertext to a disappointing endpoint where more than one otherwise plausible plaintexts are found to be associated with keys that encrypt them to that ciphertext. Unlike some previous researchers who explored this equivocation as a special case of existing schemes, this approach is aimed at devising a symmetric encryption for that purpose per se.
BibTeX
@misc{eprint-2000-11403,
  title={Essential Shannon Security with Keys Smaller Than the Encrypted Message},
  booktitle={IACR Eprint archive},
  keywords={foundations / Shannon Security,  Deniability,  Committed Ciphertext,  Variable Key Size,  Daniel,  Leonardo,},
  url={http://eprint.iacr.org/2000/059},
  note={Closely related publications appear on  www.dgsciences.com  site. gideon@dgsciences.com 11318 received 17 Nov 2000, revised 27 Dec 2000, revised 27 Dec 2000},
  author={Gideon Samid},
  year=2000
}