Preview

Proceedings of Telecommunication Universities

Advanced search

Advance in Applied Cryptography Theory: Survey and Some New Results. Part 2. Keyless Cryptography

https://doi.org/10.31854/1813-324X-2024-10-6-79-98

EDN: HPBOWG

Abstract

Actuality. The current paper is the second part of the paper “Advance in Applied Cryptography Theory: Survey and Some New Results. Part 1. Key Cryptography” published in the journal PTU, n.4, 2024. It is devoted to such specific area of applied cryptography as keyless one (KC\ Actuality of the current paper consists  in the fact that considered in it methods allow to provide a confidentiality of information transmission over public communication channels, either without any its encryption in advance, executing a natural properties of communication channels   or executing conventional key cryptography but with the keys which are elaborated before by means of KC.

The natural properties of communication channels can be the following: additive noise, multiray wave propagation, MIMO technology and existence of feedback channel.

Our paper starts with a consideration of Wyner’s concept of wire-tap channels and corresponding to it encoding and decoding methods providing very reliable information transmission over the main channels and negligible amount of information leaking over the wire-tap channels to eavesdroppers. Next it is investigated scenario   with a commutative encryption (CE) and corresponding protocol of message exchange over ordinary noiseless public channel that provides security of encrypted information but without any key exchange between users in advance. It is proved which of well known symmetric and asymmetric ciphers are commutative or non-commutative ones. Next model concerns a fading channels under the application of Dean-Goldsmith protocol in frames of MIMO technology. We are proving that this protocol is secure if, and only if, the number of eavesdropper antennas is less than the number of antennas at legitimate users. Next scenario executes  variable directional antennas (VDA) and it is proved for which conditions  on a locations of legitimate users and eavesdroppers  such approach occurs secure given the number of propagation rays is at least two..   We show in the next chapter that there is an attack compromising of recently proposed EVESkey cryptosystem and hence such one is not secure in spite of the statement of its authors.

Finally, we investigate several protocols intended for key sharing over noiseless constant public channels (like Internet) and established that they are mostly insecure because have all zero secret capacity. Only one protocol based on matrix channel exchange is able to provide security of key sharing but in terms of the required breaking complexity. Thus such approach can be used only for the case when legitimate users belong to low level of security requirements.

At the end of the paper we formulate several fundamental problems of applied cryptography which after of their solutions  could be very useful for practice.

About the Authors

V. I. Korzhik
The Bonch-Bruevich Saint Petersburg State University of Telecommunications
Russian Federation


V. A. Yakovlev
The Bonch-Bruevich Saint Petersburg State University of Telecommunications
Russian Federation


V. S. Starostin
The Bonch-Bruevich Saint Petersburg State University of Telecommunications
Russian Federation


M. V. Buinevich
Saint Petersburg University of State Fire Service of Emercom of Russia
Russian Federation


References

1. Alpern B., Schneider F.B. Key exchange using ‘keyless cryptography’. Information Processing Letters. 1983:16(2):79‒81. DOI:10.1016/0020-0190(83)90029-7

2. Korzhik V. Keyless cryptography. Proceedings of the 9th International Conference on System Administration, Networking and Security, Orlando, USA. 2000

3. Korzhik V., Bakin M. Information-theoretical Secure Keyless intensification. Proceedings of the 2000 IEEE International Symposium on Information Theory, 25‒30 June 2000, Sorrento, Italy. Piscataway: IEEE Press; 2000. DOI:10.1109/ISIT.2000.866310

4. Korzhik V. Keyless cryptography. Invited Talk at Security Seminar at CERIAS Purdue University. 2001

5. Mukherjee A., Fakoorian S.A.A., Huang J., Swindlehurst A.L. Principles of Physical Layer Security in Multiuser Wireless Network A. Survey. IEEE Communications Surveys & Tutorials. 2014;16(3):1550‒1573. DOI:10.1109/SURV.2014.012314.00178

6. Wyner A.D. The Wire-tap channel. Bell System Technical Journal. 1975;54(8):1355‒1387. DOI:10.1002/j.1538-7305.1975.tb02040.x

7. Bennett C.H., Bessette F., Brassard G., Salvail L., Smolin J. Experimental quantum cryptography. Journal of Cryptology. 1992;5:3‒28. DOI:10.1007/BF00191318

8. Kushnir D.V. Research and Development of Methods of Confidential Data Distribution on Quanto Channels. PhD Thesis. St. Petersburg: The Bonch-Bruevich Saint-Petersburg State University of Telecommunications Publ.; 1996. (in Russ.)

9. Korzhik V.I., Yakovlev V.A. Fundamentals of Cryptology St. Petersburg: Intermediia Publ.; 2016. 296 p. (in Russ.) EDN:WEQWMN

10. Korzhik V., Kushnir D. Key sharing based on the wire-tap channel type ii concept with noisy main channel // Proceedings of the International Conference on the Theory and Applications of Crypotology and Information Security, ASIACRYPT '96, 3‒7 November 1996, Kyongju, Korea. Lecture Notes in Computer Science, vol.1163. Berlin, Heidelberg: Springer; 1996. p.210‒217. DOI:10.1007/BFb0034848

11. Liu Y., Zhang W.J., Jiang C., Chen J.P., Zhang C., Pan W.X., et al. Experimental Twin-Field Quantum Key Distribution over 1000 km Fiber Distance. Physical Review Letters. 2023;130:210801. DOI:10.1103/PhysRevLett.130.210801

12. Milov M., Pham T.M., Chorti A., Barreto A.N., Fettweis G. Physical Layer Security ‒ From Theory to Practice. IEEE BITS the Information Theory Magazine. 2023;3(2):67‒79. DOI:10.1109/MBITS.2023.3338569

13. Shannon K.E. Works on Information Theory and Cybernetics. Moscow: Foreign Literature Publ.; 1963. 829 p. (in Russ.)

14. Maurer U.M. Secret key agreement by public discussion based on common information. IEEE Transactions on Information Theory. 1993;39(3):733‒742. DOI:10.1109/18.256484

15. Korzhik V.I., Yakovlev V.A. Non-asymptotic estimation of the efficiency of coded noise cancellation in channels with diversion. Problems of Information Transmission. 1991;4:223-228. (in Russ.)

16. Peterson W., Welnod E. Codes, Fixed Errors. Moscow: Mir Publ.; 1976. (in Russ.)

17. Korzhik V.I., Yakovlev V.A. Information protection from leakage due to side electromagnetic radiation and interfer-ence based on the code noise method. Informatika i vychislitelnaia tekhnika. 1993;8(1-2):61‒66. (in Russ.)

18. Korzhik V., Morales-Luna G., Balakirsky V.B. Privacy amplification theorem for noisy main channel. Proceedings of the 4th International Conference on Information Security, ISC 2001, 1‒3 October 2001, Malaga, Spain. Lecture Notes in Computer Science, vol.2200. Berlin, Heidelberg: Springer; 2001. p.18‒26. DOI:10.1007/3-540-45439-X_2

19. Yakovlev V., Korzhik V. Key Distribution Protocol Based on Noisy Channels in Presence of Active Adversary. IEEE Transactions on Information Theory. 2008;54(6):2535‒2550. DOI:10.1109/TIT.2008.921689

20. Schneier B. Applied Cryptography. Moscow: Triumf Publ.; 2002. (in Russ.)

21. Korzhik V., Starostin V., Yakovlev V., Kabardov M., Krasov A., Adadurov S. Advance in Keyless Cryptography. Chapter 6. In: Ramakrishnan S. (ed.) Lightweight Cryptographic Techniques and Cybersecurity Approaches. 2022. p.97‒117. DOI:10.5772/intechopen.104429

22. Tilborg H.C.A. Encyclopedia of Cryptography and Security. Springer, 2005.

23. Myasnikov A.G., Shpilrain V., Ushakov A. Non-commutative Cryptography and Group-theoretic Problems. American Mathematical Society; 2011. 385 p.

24. Goldreich O., Goldwasser S., Halevi S. Public-key cryptosystems from Lattice reduction problems. Proceedings of the 17th Annual International Cryptology Conference, CRYPTO '97, 17‒21 August 1997, Santa Barbara, USA. Lecture Notes in Computer Science, vol.1294. Berlin, Heidelberg: Springer; 1997. p.112‒131. DOI:10.1007/BFb0052231

25. Dean T., Goldsmith Aj. Physical layer cryptography through massive MIMO. Proceedings of the 2013 IEEE Information Theory Workshop, ITW, Seville, Spain, 9‒13 September 2013. Piscataway: IEEE; 2013. p.1‒3. DOI:10.1109/ITW.2013.6691222

26. Ben-Israel A., Greville T.N.E. Generalized Inverses: Theory and Applications. Springer; 2003.

27. Steinfeld R., Sakzad A. On massive MIMO physical layer cryptosystems. Proceedings of IEEE Information Theory Workshop ‒ Fall, ITW, 11‒15 October 2015, Jeju, Korea (South). IEEE; 2015. p.292‒296. DOI:10.1109/ITWF.2015.7360782

28. Aono T., Higuchi K., Ohira T., Komiyama B., Sasaoka H. Wireless secret key generation exploiting reactance-domain scalar response of multipath fadiny cannels. IEEE Transactions on Antennas and Propagation. 2005;53(11):3776‒3784. DOI:10.1109/TAP.2005.858853

29. Korzhik V., Yakovlev V., Kovajkin Y. Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna. International Journal of Advanced Computer Science and Applications. 2012;3(1):172‒178.

30. Qin D., Ding Z. Exploiting Multi Antenna Non-Reciprocal Channels for Share Secret Key Generation. IEEE Transactions on Information Forensics and Security. 2016;11(12):2691‒2705. DOI:10.1109/TIFS.2016.2594143

31. Yakovlev V., Korzhik V., Starostin V., Lapshin A. Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions. Proceedings of the 32nd Conference of Open Innovations Association FRUCT, 9‒11 November 2022, Tampere, Finland. FRUCT-32; 2022. p.300‒307. DOI:10.23919/FRUCT56874.2022.9953895

32. Lai E., Gamal H.El., Poor H.V. The Wiretap Channel with Feedback Encryption over the Cannel. IEEE Transactions on Information Theory. 2008;54(11):5059‒5067. DOI:10.1109/TIT.2008.929914

33. Korzhik V., Yakovlev V., Starostin V., Lapshin A. Vulnerability of the Key Sharing Protocol Executing over the Noiseless Public Cannels with Feedback. Proceedings of the 35th Conference of Open Innovations Association FRUCT-35, 24‒26 April 2024, Tampere, Finland. FRUCT Oy; 2024. p.374‒379 DOI:10.23919/FRUCT61870.2024.10516344

34.


Review

For citations:


Korzhik V.I., Yakovlev V.A., Starostin V.S., Buinevich M.V. Advance in Applied Cryptography Theory: Survey and Some New Results. Part 2. Keyless Cryptography. Proceedings of Telecommunication Universities. 2024;10(6):79-98. (In Russ.) https://doi.org/10.31854/1813-324X-2024-10-6-79-98. EDN: HPBOWG

Views: 127


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)