Loading…

One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes

This paper introduces a class of symmetric ciphering systems with a finite secret key, which provides ideal secrecy, autonomy in key generation and distribution, and robustness against the probabilistic structure of messages (the Ideally Secret Autonomous Robust (ISAR) system). The ISAR system is ba...

Full description

Saved in:
Bibliographic Details
Published in:Mathematics (Basel) 2024-12, Vol.12 (23), p.3724
Main Authors: Milosavljević, Milan, Radomirović, Jelica, Unkašević, Tomislav, Božilović, Boško
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c293t-bdfaf57dfffc0d7382b6caa0af64f8e8e2bd8462ad5a85a46146150f2c263a973
container_end_page
container_issue 23
container_start_page 3724
container_title Mathematics (Basel)
container_volume 12
creator Milosavljević, Milan
Radomirović, Jelica
Unkašević, Tomislav
Božilović, Boško
description This paper introduces a class of symmetric ciphering systems with a finite secret key, which provides ideal secrecy, autonomy in key generation and distribution, and robustness against the probabilistic structure of messages (the Ideally Secret Autonomous Robust (ISAR) system). The ISAR system is based on wiretap polar codes constructed over an artificial wiretap channel with a maximum secrecy capacity of 0.5. The system autonomously maintains a minimum level of key equivocation by continuously refreshing secret keys without additional key generation and distribution infrastructure. Moreover, it can transform any stream ciphering system with a finite secret key of known length into an ISAR system without knowing and/or changing its algorithm. Therefore, this class of system strongly supports privacy, a critical requirement for contemporary security systems. The ISAR system’s reliance on wiretap polar coding for strong secrecy ensures resistance to passive known plaintext attacks. Furthermore, resistance to passive attacks on generated refreshing keys follows directly from ideal secrecy and autonomy. The results presented offer an efficient methodology for synthesizing this class of systems with predetermined security margins and a complexity of the order of nlog⁡n, where n is the block length of the applied polar code.
doi_str_mv 10.3390/math12233724
format article
fullrecord <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_501f8a63e57a4136a01ad2ccfd6edaef</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A819950877</galeid><doaj_id>oai_doaj_org_article_501f8a63e57a4136a01ad2ccfd6edaef</doaj_id><sourcerecordid>A819950877</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-bdfaf57dfffc0d7382b6caa0af64f8e8e2bd8462ad5a85a46146150f2c263a973</originalsourceid><addsrcrecordid>eNpNUV1LKzEQXURBUd_8AQFfbzUfu9nsY-_iR0FQUPExTJNJTdnd1CR96L83WhFnBmY4c-ZwYKrqgtErITp6PUJ-Z5wL0fL6oDrhnLeztiwO_8zH1XlKa1qiY0LV3UmlHyck_QApkeDIwiIMw448o4mYyXybwxTGsE3keTeOmKM3pPebd4x-WhUsZRwT-Q8JLQkTefPlCjbkKQwQSR8sprPqyMGQ8Pynn1avtzcv_f3s4fFu0c8fZoZ3Is-W1oFrWuucM9S2QvGlNAAUnKydQoV8aVUtOdgGVAO1ZKUa6rjhUkDXitNqsde1AdZ6E_0IcacDeP0NhLjSELM3A-qGMqdACmxaqJmQQBlYboyzEi2gK1qXe61NDB9bTFmvwzZOxb4WrK5ZIyRjhXW1Z62giPrJhRzBlLQ4ehMmdL7gc8W6rqGq_bL4b39gYkgpovu1yaj-eqH--0LxCTP8jxc</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3144153611</pqid></control><display><type>article</type><title>One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes</title><source>Publicly Available Content (ProQuest)</source><creator>Milosavljević, Milan ; Radomirović, Jelica ; Unkašević, Tomislav ; Božilović, Boško</creator><creatorcontrib>Milosavljević, Milan ; Radomirović, Jelica ; Unkašević, Tomislav ; Božilović, Boško</creatorcontrib><description>This paper introduces a class of symmetric ciphering systems with a finite secret key, which provides ideal secrecy, autonomy in key generation and distribution, and robustness against the probabilistic structure of messages (the Ideally Secret Autonomous Robust (ISAR) system). The ISAR system is based on wiretap polar codes constructed over an artificial wiretap channel with a maximum secrecy capacity of 0.5. The system autonomously maintains a minimum level of key equivocation by continuously refreshing secret keys without additional key generation and distribution infrastructure. Moreover, it can transform any stream ciphering system with a finite secret key of known length into an ISAR system without knowing and/or changing its algorithm. Therefore, this class of system strongly supports privacy, a critical requirement for contemporary security systems. The ISAR system’s reliance on wiretap polar coding for strong secrecy ensures resistance to passive known plaintext attacks. Furthermore, resistance to passive attacks on generated refreshing keys follows directly from ideal secrecy and autonomy. The results presented offer an efficient methodology for synthesizing this class of systems with predetermined security margins and a complexity of the order of nlog⁡n, where n is the block length of the applied polar code.</description><identifier>ISSN: 2227-7390</identifier><identifier>EISSN: 2227-7390</identifier><identifier>DOI: 10.3390/math12233724</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Algorithms ; Autonomy ; Cryptography ; Electronic surveillance ; Entropy ; ideal secrecy ; Infrastructure ; Investment analysis ; key equivocation ; polar coding ; privacy amplification ; Random variables ; Secrecy aspects ; Security systems ; wiretap channel ; Wiretapping</subject><ispartof>Mathematics (Basel), 2024-12, Vol.12 (23), p.3724</ispartof><rights>COPYRIGHT 2024 MDPI AG</rights><rights>2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c293t-bdfaf57dfffc0d7382b6caa0af64f8e8e2bd8462ad5a85a46146150f2c263a973</cites><orcidid>0000-0001-9630-804X ; 0000-0003-4895-5730</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/3144153611/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/3144153611?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25744,27915,27916,37003,44581,74887</link.rule.ids></links><search><creatorcontrib>Milosavljević, Milan</creatorcontrib><creatorcontrib>Radomirović, Jelica</creatorcontrib><creatorcontrib>Unkašević, Tomislav</creatorcontrib><creatorcontrib>Božilović, Boško</creatorcontrib><title>One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes</title><title>Mathematics (Basel)</title><description>This paper introduces a class of symmetric ciphering systems with a finite secret key, which provides ideal secrecy, autonomy in key generation and distribution, and robustness against the probabilistic structure of messages (the Ideally Secret Autonomous Robust (ISAR) system). The ISAR system is based on wiretap polar codes constructed over an artificial wiretap channel with a maximum secrecy capacity of 0.5. The system autonomously maintains a minimum level of key equivocation by continuously refreshing secret keys without additional key generation and distribution infrastructure. Moreover, it can transform any stream ciphering system with a finite secret key of known length into an ISAR system without knowing and/or changing its algorithm. Therefore, this class of system strongly supports privacy, a critical requirement for contemporary security systems. The ISAR system’s reliance on wiretap polar coding for strong secrecy ensures resistance to passive known plaintext attacks. Furthermore, resistance to passive attacks on generated refreshing keys follows directly from ideal secrecy and autonomy. The results presented offer an efficient methodology for synthesizing this class of systems with predetermined security margins and a complexity of the order of nlog⁡n, where n is the block length of the applied polar code.</description><subject>Algorithms</subject><subject>Autonomy</subject><subject>Cryptography</subject><subject>Electronic surveillance</subject><subject>Entropy</subject><subject>ideal secrecy</subject><subject>Infrastructure</subject><subject>Investment analysis</subject><subject>key equivocation</subject><subject>polar coding</subject><subject>privacy amplification</subject><subject>Random variables</subject><subject>Secrecy aspects</subject><subject>Security systems</subject><subject>wiretap channel</subject><subject>Wiretapping</subject><issn>2227-7390</issn><issn>2227-7390</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpNUV1LKzEQXURBUd_8AQFfbzUfu9nsY-_iR0FQUPExTJNJTdnd1CR96L83WhFnBmY4c-ZwYKrqgtErITp6PUJ-Z5wL0fL6oDrhnLeztiwO_8zH1XlKa1qiY0LV3UmlHyck_QApkeDIwiIMw448o4mYyXybwxTGsE3keTeOmKM3pPebd4x-WhUsZRwT-Q8JLQkTefPlCjbkKQwQSR8sprPqyMGQ8Pynn1avtzcv_f3s4fFu0c8fZoZ3Is-W1oFrWuucM9S2QvGlNAAUnKydQoV8aVUtOdgGVAO1ZKUa6rjhUkDXitNqsde1AdZ6E_0IcacDeP0NhLjSELM3A-qGMqdACmxaqJmQQBlYboyzEi2gK1qXe61NDB9bTFmvwzZOxb4WrK5ZIyRjhXW1Z62giPrJhRzBlLQ4ehMmdL7gc8W6rqGq_bL4b39gYkgpovu1yaj-eqH--0LxCTP8jxc</recordid><startdate>20241201</startdate><enddate>20241201</enddate><creator>Milosavljević, Milan</creator><creator>Radomirović, Jelica</creator><creator>Unkašević, Tomislav</creator><creator>Božilović, Boško</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7TB</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FR3</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>KR7</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M7S</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-9630-804X</orcidid><orcidid>https://orcid.org/0000-0003-4895-5730</orcidid></search><sort><creationdate>20241201</creationdate><title>One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes</title><author>Milosavljević, Milan ; Radomirović, Jelica ; Unkašević, Tomislav ; Božilović, Boško</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-bdfaf57dfffc0d7382b6caa0af64f8e8e2bd8462ad5a85a46146150f2c263a973</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Autonomy</topic><topic>Cryptography</topic><topic>Electronic surveillance</topic><topic>Entropy</topic><topic>ideal secrecy</topic><topic>Infrastructure</topic><topic>Investment analysis</topic><topic>key equivocation</topic><topic>polar coding</topic><topic>privacy amplification</topic><topic>Random variables</topic><topic>Secrecy aspects</topic><topic>Security systems</topic><topic>wiretap channel</topic><topic>Wiretapping</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Milosavljević, Milan</creatorcontrib><creatorcontrib>Radomirović, Jelica</creatorcontrib><creatorcontrib>Unkašević, Tomislav</creatorcontrib><creatorcontrib>Božilović, Boško</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Engineering Research Database</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>ProQuest Engineering Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Mathematics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Milosavljević, Milan</au><au>Radomirović, Jelica</au><au>Unkašević, Tomislav</au><au>Božilović, Boško</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes</atitle><jtitle>Mathematics (Basel)</jtitle><date>2024-12-01</date><risdate>2024</risdate><volume>12</volume><issue>23</issue><spage>3724</spage><pages>3724-</pages><issn>2227-7390</issn><eissn>2227-7390</eissn><abstract>This paper introduces a class of symmetric ciphering systems with a finite secret key, which provides ideal secrecy, autonomy in key generation and distribution, and robustness against the probabilistic structure of messages (the Ideally Secret Autonomous Robust (ISAR) system). The ISAR system is based on wiretap polar codes constructed over an artificial wiretap channel with a maximum secrecy capacity of 0.5. The system autonomously maintains a minimum level of key equivocation by continuously refreshing secret keys without additional key generation and distribution infrastructure. Moreover, it can transform any stream ciphering system with a finite secret key of known length into an ISAR system without knowing and/or changing its algorithm. Therefore, this class of system strongly supports privacy, a critical requirement for contemporary security systems. The ISAR system’s reliance on wiretap polar coding for strong secrecy ensures resistance to passive known plaintext attacks. Furthermore, resistance to passive attacks on generated refreshing keys follows directly from ideal secrecy and autonomy. The results presented offer an efficient methodology for synthesizing this class of systems with predetermined security margins and a complexity of the order of nlog⁡n, where n is the block length of the applied polar code.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/math12233724</doi><orcidid>https://orcid.org/0000-0001-9630-804X</orcidid><orcidid>https://orcid.org/0000-0003-4895-5730</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2227-7390
ispartof Mathematics (Basel), 2024-12, Vol.12 (23), p.3724
issn 2227-7390
2227-7390
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_501f8a63e57a4136a01ad2ccfd6edaef
source Publicly Available Content (ProQuest)
subjects Algorithms
Autonomy
Cryptography
Electronic surveillance
Entropy
ideal secrecy
Infrastructure
Investment analysis
key equivocation
polar coding
privacy amplification
Random variables
Secrecy aspects
Security systems
wiretap channel
Wiretapping
title One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T23%3A33%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=One%20Class%20of%20Ideally%20Secret%20Autonomous%20Symmetric%20Ciphering%20Systems%20Based%20on%20Wiretap%20Polar%20Codes&rft.jtitle=Mathematics%20(Basel)&rft.au=Milosavljevi%C4%87,%20Milan&rft.date=2024-12-01&rft.volume=12&rft.issue=23&rft.spage=3724&rft.pages=3724-&rft.issn=2227-7390&rft.eissn=2227-7390&rft_id=info:doi/10.3390/math12233724&rft_dat=%3Cgale_doaj_%3EA819950877%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c293t-bdfaf57dfffc0d7382b6caa0af64f8e8e2bd8462ad5a85a46146150f2c263a973%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=3144153611&rft_id=info:pmid/&rft_galeid=A819950877&rfr_iscdi=true