Combining Conventional Cryptography with Information Theoretic Security
Abstract
This paper highlights security issues that can arise when incorrect assumptions are made on the capabilities of an eavesdropper. In particular, we analyze a channel model based on a split Binary Symmetric Channel (BSC). Corresponding security parameters are chosen based on this channel model, and assumptions on the eavesdroppers capabilities. A gradual relaxation of the restrictions on the eavesdropper's capabilities will be made, and the resulting loss of security will be quantified. An alternative will then be presented that is based on stochastic encoding and creating artificially noisy channels through the usage of private keys. The artificial channel will be constructed through a deterministic process that will be computationally intractable to reverse.
- Publication:
-
arXiv e-prints
- Pub Date:
- December 2014
- DOI:
- 10.48550/arXiv.1412.8007
- arXiv:
- arXiv:1412.8007
- Bibcode:
- 2014arXiv1412.8007C
- Keywords:
-
- Computer Science - Information Theory
- E-Print:
- 7 pages, 5 figures