uu.seUppsala University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Enhanced Usage of Keys Obtained by Physical, Unconditionally Secure Distributions
Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Engineering Sciences, Solid State Physics.
2015 (English)In: Fluctuation and Noise Letters, ISSN 0219-4775, E-ISSN 1793-6780, Vol. 14, no 2, 1-3 p., 1550007Article in journal (Refereed) Published
Abstract [en]

Unconditionally secure physical key distribution schemes are very slow, and it is practically impossible to use a one-time-pad based cipher to guarantee unconditional security for the encryption of data because using the key bits more than once gives out statistical information, for example via the known-plain-text-attack or by utilizing known components of the protocol and language statistics. Here, we outline a protocol that reduces this speed problem and allows almost-one-time-pad based communication with an unconditionally secure physical key of finite length. The physical, unconditionally secure key is not used for data encryption but is employed in order to generate and share a new software-based key without any known-plain-text component. The software-only-based key distribution is then changed from computationally secure to unconditionally secure, because the communicated key-exchange data (algorithm parameters, one-way functions of random numbers, etc.) are encrypted in an unconditionally secure way with a one-time-pad. For practical applications, this combined physical/software key distribution based communication looks favorable compared to the software-only and physical-only key distribution based communication whenever the speed of the physical key distribution is much lower than that of the software-based key distribution. A mathematical security proof of this new scheme remains an open problem.

Place, publisher, year, edition, pages
2015. Vol. 14, no 2, 1-3 p., 1550007
Keyword [en]
Information theoretic security, secure key, one-time-pad
National Category
Physical Sciences Engineering and Technology
Identifiers
URN: urn:nbn:se:uu:diva-253227DOI: 10.1142/S0219477515500078ISI: 000353952700001OAI: oai:DiVA.org:uu-253227DiVA: diva2:824603
Available from: 2015-06-22 Created: 2015-05-25 Last updated: 2017-12-04Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Authority records BETA

Granqvist, Claes-Göran

Search in DiVA

By author/editor
Granqvist, Claes-Göran
By organisation
Solid State Physics
In the same journal
Fluctuation and Noise Letters
Physical SciencesEngineering and Technology

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 828 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf