Emergent Mind

Abstract

Information-theoretically secure communications are possible when channel noise is usable and when the channel has an intrinsic characteristic that a legitimate receiver (Bob) can use the noise more advantageously than an eavesdropper (Eve). This report deals with the case in which the channel does not have such an intrinsic characteristic. Here, we use a pre-shared common key as a tool that extrinsically makes Bob more advantageous than Eve. This method uses error-correcting code in addition to the common key and noise, and manages the three components in random-number transmission. Secret keys are generated from noise, and messages are encrypted with the secret keys in a one-time pad manner. As a result, information leaks meaningful to Eve are restricted to the parity-check symbols for the random numbers. It is possible to derive the candidates of the common key from the parity check symbols, and the security of this method is quantified in terms of the amount of computations needed for an exhaustive search of the candidates, where we evaluate the security by assuming that all parity check symbols leak to Eve without bit errors. Noise contributes to not only generating secret keys but also enhancing the security because the candidates of the common key increase with it.

We're not able to analyze this paper right now due to high demand.

Please check back later (sorry!).

Generate a summary of this paper on our Pro plan:

We ran into a problem analyzing this paper.

Newsletter

Get summaries of trending comp sci papers delivered straight to your inbox:

Unsubscribe anytime.