Skip to main content

Vintage Bit Cryptography

  • Conference paper
Security Protocols (Security Protocols 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5087))

Included in the following conference series:

  • 595 Accesses

Abstract

We propose to use a Random High-Rate Binary (RHRB) stream for the purpose of key distribution. The idea is as follows. Assume availability of a high-rate (terabits per second) broadcaster sending random content. Members of the key group (e.g. {Alice, Bob}) share a weak secret (at least 60 bits) and use it to make a selection of bits from the RHRB stream at an extremely low rate (1 bit out of 1016 to 1018). By the time that a strong key of reasonable size has been collected (1,000 bits), an enormous amount of data has been broadcast (1019 − 1021 bits). This is 106 to 108 times current hard drive capacity, which makes it infeasible for the interceptor (Eve) to store the stream for subsequent cryptanalysis, which is what the interceptor would have to do in the absence of the shared secret. Alternatively Eve could record the selection of bits that correspond to every value of the weak shared secret, which under the above assumptions requires the same or greater amount of storage i.e. 260×103. The members of the key group have no need to capture the whole stream, but store only the tiny part of it that is the key. Effectively this allows a pseudo-random sequence generated from a weak key to be leveraged up into a strong genuinely random key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Anderson, R., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., Needham, R.: A new family of authentication protocols. Operating Systems Review 32(4), 9–20 (1998)

    Article  Google Scholar 

  2. Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. In: Proceedings of the I.E.E.E. Symposium on Research in Security and Privacy, Oakland (May 1992)

    Google Scholar 

  3. Christianson, B., Wheeler, D.: Merkle Puzzles Revisited – Finding Matching Elements between Lists. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2001. LNCS, vol. 2467, pp. 87–90. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Christianson, B., Roe, M., Wheeler, D.: Secure Sessions from Weak Secrets. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol. 3364, pp. 190–205. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Ding, X., Mazzocchi, D., Tsudik, G.: Experimenting with Server-Aided Signatures. In: Proceedings of Network and Distributed System Security Symposium, NDSS 2002 (2002)

    Google Scholar 

  6. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)

    Article  Google Scholar 

  7. Gobby, S.C., Yuan, Z.L., Shields, A.J.: Quantum key distribution over 122km standard telecom fiber. Appl. Phys. Lett. 84, 3762–3764 (2004)

    Article  Google Scholar 

  8. Hughes, R.J., Morgan, G.L., Peterson, C.G.: Quantum key distribution over a 48 km optical fibre network. J. Mod. Phys. 47, 533–547 (2000)

    MathSciNet  Google Scholar 

  9. Maurer, U.: Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology 5, 53–66 (1992)

    MATH  MathSciNet  Google Scholar 

  10. Cachin, C., Maurer, U.M.: Unconditional Secrecy against Memory-Bounded Adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 292–306. Springer, Heidelberg (1997)

    Google Scholar 

  11. Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)

    Google Scholar 

  12. Mitchell, C.J.: A storage complexity based analogue of Maurer key establishment using public channels. In: Boyd, C. (ed.) Cryptography and Coding 1995. LNCS, vol. 1025, pp. 84–93. Springer, Heidelberg (1995)

    Google Scholar 

  13. Rabin, M., Ding, Y.Z.: Hyper-Encryption and Everlasting Security. In: Alt, H., Ferreira, A. (eds.) STACS 2002. LNCS, vol. 2285, p. 1. Springer, Heidelberg (2002)

    Google Scholar 

  14. Wu, B.B., Narimanov, E.E.: A method for secure communications over a public fiber-optical network. Opt. Express 14, 3738–3751 (2006)

    Article  Google Scholar 

  15. Yoshizawa, A., Kaji, R., Tsuchida, H.: 10.5 km fiber-optic quantum key distribution at 1550 nm with a key rate of 45 kHz. Japanese J. Appl. Phys. 43, L735–L737 (2004)

    Article  Google Scholar 

  16. Yuan, Z., Shields, A.: Continuous operation of a one-way quantum key distribution system over installed telecom fibre. Opt. Express 13, 660–665 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Christianson, B., Shafarenko, A. (2009). Vintage Bit Cryptography. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2006. Lecture Notes in Computer Science, vol 5087. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04904-0_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04904-0_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04903-3

  • Online ISBN: 978-3-642-04904-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics