An information-theoretic security evaluation of a class of randomized encryption schemes

Randomized encryption techniques, where randomness is used for security enhancement, are considered. We focus on the case where the encrypted data experiences noise, e.g., is transmitted over a noisy channel, within the encoding-encryption paradigm, where the data is first encoded for error correcti...

Full description

Saved in:
Bibliographic Details
Main Authors: Oggier, Frédérique, Mihaljević, Miodrag J.
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2014
Subjects:
Online Access:https://hdl.handle.net/10356/101619
http://hdl.handle.net/10220/18744
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-101619
record_format dspace
spelling sg-ntu-dr.10356-1016192023-02-28T19:42:29Z An information-theoretic security evaluation of a class of randomized encryption schemes Oggier, Frédérique Mihaljević, Miodrag J. School of Physical and Mathematical Sciences DRNTU::Science::Physics Randomized encryption techniques, where randomness is used for security enhancement, are considered. We focus on the case where the encrypted data experiences noise, e.g., is transmitted over a noisy channel, within the encoding-encryption paradigm, where the data is first encoded for error correction, before being encrypted for security. We assume that the ciphertext is subject to a corruption equivalent to its transmission through a binary symmetric channel with known probability of error. The enhanced security is based on a dedicated wire-tap channel coding that introduces extra randomness, combined with that of the communication channel noise. The encryption is based on a block-by-block modulo 2 addition between an encoded message vector and a pseudorandom vector. The goal is to enhance the protection of the secret key employed in the encryption algorithm. Security evaluations of the model are performed employing an information-theoretic approach. Assuming both a passive and an active attacker, we show that there is a threshold before which the wire-tap encoder guarantees an information-theoretic security (during which the equivocation of the secret key is increased), and after which the uncertainty reduces, entering a regime in which a computational security analysis is needed for estimating the complexity resistance against the secret key recovery. NRF (Natl Research Foundation, S’pore) Accepted version 2014-01-29T03:27:55Z 2019-12-06T20:41:34Z 2014-01-29T03:27:55Z 2019-12-06T20:41:34Z 2013 2013 Journal Article Oggier, F., & Mihaljević, M. J. (2013). An information-theoretic security evaluation of a class of randomized encryption schemes. IEEE transactions on information forensics and security, 9(2), 158-168. https://hdl.handle.net/10356/101619 http://hdl.handle.net/10220/18744 10.1109/TIFS.2013.2294763 175130 en IEEE transactions on information forensics and security © 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/TIFS.2013.2294763]. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Science::Physics
spellingShingle DRNTU::Science::Physics
Oggier, Frédérique
Mihaljević, Miodrag J.
An information-theoretic security evaluation of a class of randomized encryption schemes
description Randomized encryption techniques, where randomness is used for security enhancement, are considered. We focus on the case where the encrypted data experiences noise, e.g., is transmitted over a noisy channel, within the encoding-encryption paradigm, where the data is first encoded for error correction, before being encrypted for security. We assume that the ciphertext is subject to a corruption equivalent to its transmission through a binary symmetric channel with known probability of error. The enhanced security is based on a dedicated wire-tap channel coding that introduces extra randomness, combined with that of the communication channel noise. The encryption is based on a block-by-block modulo 2 addition between an encoded message vector and a pseudorandom vector. The goal is to enhance the protection of the secret key employed in the encryption algorithm. Security evaluations of the model are performed employing an information-theoretic approach. Assuming both a passive and an active attacker, we show that there is a threshold before which the wire-tap encoder guarantees an information-theoretic security (during which the equivocation of the secret key is increased), and after which the uncertainty reduces, entering a regime in which a computational security analysis is needed for estimating the complexity resistance against the secret key recovery.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Oggier, Frédérique
Mihaljević, Miodrag J.
format Article
author Oggier, Frédérique
Mihaljević, Miodrag J.
author_sort Oggier, Frédérique
title An information-theoretic security evaluation of a class of randomized encryption schemes
title_short An information-theoretic security evaluation of a class of randomized encryption schemes
title_full An information-theoretic security evaluation of a class of randomized encryption schemes
title_fullStr An information-theoretic security evaluation of a class of randomized encryption schemes
title_full_unstemmed An information-theoretic security evaluation of a class of randomized encryption schemes
title_sort information-theoretic security evaluation of a class of randomized encryption schemes
publishDate 2014
url https://hdl.handle.net/10356/101619
http://hdl.handle.net/10220/18744
_version_ 1759856964314071040