Loading…
One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes
This paper introduces a class of symmetric ciphering systems with a finite secret key, which provides ideal secrecy, autonomy in key generation and distribution, and robustness against the probabilistic structure of messages (the Ideally Secret Autonomous Robust (ISAR) system). The ISAR system is ba...
Saved in:
Published in: | Mathematics (Basel) 2024-12, Vol.12 (23), p.3724 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c293t-bdfaf57dfffc0d7382b6caa0af64f8e8e2bd8462ad5a85a46146150f2c263a973 |
container_end_page | |
container_issue | 23 |
container_start_page | 3724 |
container_title | Mathematics (Basel) |
container_volume | 12 |
creator | Milosavljević, Milan Radomirović, Jelica Unkašević, Tomislav Božilović, Boško |
description | This paper introduces a class of symmetric ciphering systems with a finite secret key, which provides ideal secrecy, autonomy in key generation and distribution, and robustness against the probabilistic structure of messages (the Ideally Secret Autonomous Robust (ISAR) system). The ISAR system is based on wiretap polar codes constructed over an artificial wiretap channel with a maximum secrecy capacity of 0.5. The system autonomously maintains a minimum level of key equivocation by continuously refreshing secret keys without additional key generation and distribution infrastructure. Moreover, it can transform any stream ciphering system with a finite secret key of known length into an ISAR system without knowing and/or changing its algorithm. Therefore, this class of system strongly supports privacy, a critical requirement for contemporary security systems. The ISAR system’s reliance on wiretap polar coding for strong secrecy ensures resistance to passive known plaintext attacks. Furthermore, resistance to passive attacks on generated refreshing keys follows directly from ideal secrecy and autonomy. The results presented offer an efficient methodology for synthesizing this class of systems with predetermined security margins and a complexity of the order of nlogn, where n is the block length of the applied polar code. |
doi_str_mv | 10.3390/math12233724 |
format | article |
fullrecord | <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_501f8a63e57a4136a01ad2ccfd6edaef</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A819950877</galeid><doaj_id>oai_doaj_org_article_501f8a63e57a4136a01ad2ccfd6edaef</doaj_id><sourcerecordid>A819950877</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-bdfaf57dfffc0d7382b6caa0af64f8e8e2bd8462ad5a85a46146150f2c263a973</originalsourceid><addsrcrecordid>eNpNUV1LKzEQXURBUd_8AQFfbzUfu9nsY-_iR0FQUPExTJNJTdnd1CR96L83WhFnBmY4c-ZwYKrqgtErITp6PUJ-Z5wL0fL6oDrhnLeztiwO_8zH1XlKa1qiY0LV3UmlHyck_QApkeDIwiIMw448o4mYyXybwxTGsE3keTeOmKM3pPebd4x-WhUsZRwT-Q8JLQkTefPlCjbkKQwQSR8sprPqyMGQ8Pynn1avtzcv_f3s4fFu0c8fZoZ3Is-W1oFrWuucM9S2QvGlNAAUnKydQoV8aVUtOdgGVAO1ZKUa6rjhUkDXitNqsde1AdZ6E_0IcacDeP0NhLjSELM3A-qGMqdACmxaqJmQQBlYboyzEi2gK1qXe61NDB9bTFmvwzZOxb4WrK5ZIyRjhXW1Z62giPrJhRzBlLQ4ehMmdL7gc8W6rqGq_bL4b39gYkgpovu1yaj-eqH--0LxCTP8jxc</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3144153611</pqid></control><display><type>article</type><title>One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes</title><source>Publicly Available Content (ProQuest)</source><creator>Milosavljević, Milan ; Radomirović, Jelica ; Unkašević, Tomislav ; Božilović, Boško</creator><creatorcontrib>Milosavljević, Milan ; Radomirović, Jelica ; Unkašević, Tomislav ; Božilović, Boško</creatorcontrib><description>This paper introduces a class of symmetric ciphering systems with a finite secret key, which provides ideal secrecy, autonomy in key generation and distribution, and robustness against the probabilistic structure of messages (the Ideally Secret Autonomous Robust (ISAR) system). The ISAR system is based on wiretap polar codes constructed over an artificial wiretap channel with a maximum secrecy capacity of 0.5. The system autonomously maintains a minimum level of key equivocation by continuously refreshing secret keys without additional key generation and distribution infrastructure. Moreover, it can transform any stream ciphering system with a finite secret key of known length into an ISAR system without knowing and/or changing its algorithm. Therefore, this class of system strongly supports privacy, a critical requirement for contemporary security systems. The ISAR system’s reliance on wiretap polar coding for strong secrecy ensures resistance to passive known plaintext attacks. Furthermore, resistance to passive attacks on generated refreshing keys follows directly from ideal secrecy and autonomy. The results presented offer an efficient methodology for synthesizing this class of systems with predetermined security margins and a complexity of the order of nlogn, where n is the block length of the applied polar code.</description><identifier>ISSN: 2227-7390</identifier><identifier>EISSN: 2227-7390</identifier><identifier>DOI: 10.3390/math12233724</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Algorithms ; Autonomy ; Cryptography ; Electronic surveillance ; Entropy ; ideal secrecy ; Infrastructure ; Investment analysis ; key equivocation ; polar coding ; privacy amplification ; Random variables ; Secrecy aspects ; Security systems ; wiretap channel ; Wiretapping</subject><ispartof>Mathematics (Basel), 2024-12, Vol.12 (23), p.3724</ispartof><rights>COPYRIGHT 2024 MDPI AG</rights><rights>2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c293t-bdfaf57dfffc0d7382b6caa0af64f8e8e2bd8462ad5a85a46146150f2c263a973</cites><orcidid>0000-0001-9630-804X ; 0000-0003-4895-5730</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/3144153611/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/3144153611?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25744,27915,27916,37003,44581,74887</link.rule.ids></links><search><creatorcontrib>Milosavljević, Milan</creatorcontrib><creatorcontrib>Radomirović, Jelica</creatorcontrib><creatorcontrib>Unkašević, Tomislav</creatorcontrib><creatorcontrib>Božilović, Boško</creatorcontrib><title>One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes</title><title>Mathematics (Basel)</title><description>This paper introduces a class of symmetric ciphering systems with a finite secret key, which provides ideal secrecy, autonomy in key generation and distribution, and robustness against the probabilistic structure of messages (the Ideally Secret Autonomous Robust (ISAR) system). The ISAR system is based on wiretap polar codes constructed over an artificial wiretap channel with a maximum secrecy capacity of 0.5. The system autonomously maintains a minimum level of key equivocation by continuously refreshing secret keys without additional key generation and distribution infrastructure. Moreover, it can transform any stream ciphering system with a finite secret key of known length into an ISAR system without knowing and/or changing its algorithm. Therefore, this class of system strongly supports privacy, a critical requirement for contemporary security systems. The ISAR system’s reliance on wiretap polar coding for strong secrecy ensures resistance to passive known plaintext attacks. Furthermore, resistance to passive attacks on generated refreshing keys follows directly from ideal secrecy and autonomy. The results presented offer an efficient methodology for synthesizing this class of systems with predetermined security margins and a complexity of the order of nlogn, where n is the block length of the applied polar code.</description><subject>Algorithms</subject><subject>Autonomy</subject><subject>Cryptography</subject><subject>Electronic surveillance</subject><subject>Entropy</subject><subject>ideal secrecy</subject><subject>Infrastructure</subject><subject>Investment analysis</subject><subject>key equivocation</subject><subject>polar coding</subject><subject>privacy amplification</subject><subject>Random variables</subject><subject>Secrecy aspects</subject><subject>Security systems</subject><subject>wiretap channel</subject><subject>Wiretapping</subject><issn>2227-7390</issn><issn>2227-7390</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpNUV1LKzEQXURBUd_8AQFfbzUfu9nsY-_iR0FQUPExTJNJTdnd1CR96L83WhFnBmY4c-ZwYKrqgtErITp6PUJ-Z5wL0fL6oDrhnLeztiwO_8zH1XlKa1qiY0LV3UmlHyck_QApkeDIwiIMw448o4mYyXybwxTGsE3keTeOmKM3pPebd4x-WhUsZRwT-Q8JLQkTefPlCjbkKQwQSR8sprPqyMGQ8Pynn1avtzcv_f3s4fFu0c8fZoZ3Is-W1oFrWuucM9S2QvGlNAAUnKydQoV8aVUtOdgGVAO1ZKUa6rjhUkDXitNqsde1AdZ6E_0IcacDeP0NhLjSELM3A-qGMqdACmxaqJmQQBlYboyzEi2gK1qXe61NDB9bTFmvwzZOxb4WrK5ZIyRjhXW1Z62giPrJhRzBlLQ4ehMmdL7gc8W6rqGq_bL4b39gYkgpovu1yaj-eqH--0LxCTP8jxc</recordid><startdate>20241201</startdate><enddate>20241201</enddate><creator>Milosavljević, Milan</creator><creator>Radomirović, Jelica</creator><creator>Unkašević, Tomislav</creator><creator>Božilović, Boško</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7TB</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FR3</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>KR7</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M7S</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-9630-804X</orcidid><orcidid>https://orcid.org/0000-0003-4895-5730</orcidid></search><sort><creationdate>20241201</creationdate><title>One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes</title><author>Milosavljević, Milan ; Radomirović, Jelica ; Unkašević, Tomislav ; Božilović, Boško</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-bdfaf57dfffc0d7382b6caa0af64f8e8e2bd8462ad5a85a46146150f2c263a973</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Autonomy</topic><topic>Cryptography</topic><topic>Electronic surveillance</topic><topic>Entropy</topic><topic>ideal secrecy</topic><topic>Infrastructure</topic><topic>Investment analysis</topic><topic>key equivocation</topic><topic>polar coding</topic><topic>privacy amplification</topic><topic>Random variables</topic><topic>Secrecy aspects</topic><topic>Security systems</topic><topic>wiretap channel</topic><topic>Wiretapping</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Milosavljević, Milan</creatorcontrib><creatorcontrib>Radomirović, Jelica</creatorcontrib><creatorcontrib>Unkašević, Tomislav</creatorcontrib><creatorcontrib>Božilović, Boško</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Engineering Research Database</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>ProQuest Engineering Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Mathematics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Milosavljević, Milan</au><au>Radomirović, Jelica</au><au>Unkašević, Tomislav</au><au>Božilović, Boško</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes</atitle><jtitle>Mathematics (Basel)</jtitle><date>2024-12-01</date><risdate>2024</risdate><volume>12</volume><issue>23</issue><spage>3724</spage><pages>3724-</pages><issn>2227-7390</issn><eissn>2227-7390</eissn><abstract>This paper introduces a class of symmetric ciphering systems with a finite secret key, which provides ideal secrecy, autonomy in key generation and distribution, and robustness against the probabilistic structure of messages (the Ideally Secret Autonomous Robust (ISAR) system). The ISAR system is based on wiretap polar codes constructed over an artificial wiretap channel with a maximum secrecy capacity of 0.5. The system autonomously maintains a minimum level of key equivocation by continuously refreshing secret keys without additional key generation and distribution infrastructure. Moreover, it can transform any stream ciphering system with a finite secret key of known length into an ISAR system without knowing and/or changing its algorithm. Therefore, this class of system strongly supports privacy, a critical requirement for contemporary security systems. The ISAR system’s reliance on wiretap polar coding for strong secrecy ensures resistance to passive known plaintext attacks. Furthermore, resistance to passive attacks on generated refreshing keys follows directly from ideal secrecy and autonomy. The results presented offer an efficient methodology for synthesizing this class of systems with predetermined security margins and a complexity of the order of nlogn, where n is the block length of the applied polar code.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/math12233724</doi><orcidid>https://orcid.org/0000-0001-9630-804X</orcidid><orcidid>https://orcid.org/0000-0003-4895-5730</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2227-7390 |
ispartof | Mathematics (Basel), 2024-12, Vol.12 (23), p.3724 |
issn | 2227-7390 2227-7390 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_501f8a63e57a4136a01ad2ccfd6edaef |
source | Publicly Available Content (ProQuest) |
subjects | Algorithms Autonomy Cryptography Electronic surveillance Entropy ideal secrecy Infrastructure Investment analysis key equivocation polar coding privacy amplification Random variables Secrecy aspects Security systems wiretap channel Wiretapping |
title | One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T23%3A33%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=One%20Class%20of%20Ideally%20Secret%20Autonomous%20Symmetric%20Ciphering%20Systems%20Based%20on%20Wiretap%20Polar%20Codes&rft.jtitle=Mathematics%20(Basel)&rft.au=Milosavljevi%C4%87,%20Milan&rft.date=2024-12-01&rft.volume=12&rft.issue=23&rft.spage=3724&rft.pages=3724-&rft.issn=2227-7390&rft.eissn=2227-7390&rft_id=info:doi/10.3390/math12233724&rft_dat=%3Cgale_doaj_%3EA819950877%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c293t-bdfaf57dfffc0d7382b6caa0af64f8e8e2bd8462ad5a85a46146150f2c263a973%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=3144153611&rft_id=info:pmid/&rft_galeid=A819950877&rfr_iscdi=true |