【24h】

Error correcting codes, block designs, perfect secrecy and finite fields

机译:纠错代码,块设计,完美保密和有限域

获取原文
获取原文并翻译 | 示例
           

摘要

The ancient difficulty for establishing a common cryptographic secret key between two communicating parties Alice and Bob is nicely summarized by the Catch-22 dictum of S. J. Lomonaco [1999], to wit: "in order to communicate in secret one must first communicate in secret". In other words, to communicate in secret, Alice and Bob must already have a shared secret key. In this paper we analyse an algorithm for establishing such a common secret key by public discussion, under the modest and practical requirement that Alice and Bob are initially in possession of keys A and B, respectively, of a common length N which are not necessarily equal but are such that the mutual information I( A, B) is non-zero. This assumption is tantamount to assuming only that the corresponding statistical variables are correlated. The common secret key distilled by the algorithm will enjoy perfect secrecy in the sense of Shannon. The method thus provides a profound generalization of traditional symmetric key cryptography and applies also to quantum cryptography. Here, by purely elementary methods, we give a rigorous proof that the method proposed by Bennett, Bessette, Brassard, Salvail, and Smolin will in general converge to a non-empty common key under moderate assumptions on the choice of block lengths provided the initial bit strings are sufficiently long. Full details on the length requirements are presented. Furthermore, we consider the question of which block lengths should be chosen for optimal performance with respect to the length of the resulting common key. A new and fundamental aspect of this paper is the explicit utilization of finite fields and error-correcting codes both for checking equality of the generated keys and, later, for the construction of various hash functions. Traditionally this check has been done by performing a few times a comparison of the parity of a random subset of the bits. Here we give a much more efficient procedure by using the powerful methods of error-correcting codes. More general situations are treated in Section 8.
机译:SJ Lomonaco [1999]的Catch-22格言很好地概括了在两个通信方Alice和Bob之间建立通用密码秘密密钥的古老困难,即:“为了进行秘密通信,必须先进行秘密通信”。 。换句话说,要进行秘密通信,Alice和Bob必须已经拥有一个共享密钥。本文在适度和实际的要求下,通过爱丽丝和鲍勃分别拥有公共长度N(不一定相等)的密钥A和B的适度和实际要求,通过公开讨论分析了用于建立这种公共密钥的算法。但是相互信息I(A,B)不为零。该假设等于仅假设对应的统计变量是相关的。该算法提取的公共密钥在香农的意义上将享有完美的保密性。因此,该方法提供了传统对称密钥密码学的深刻概括,并且也适用于量子密码学。在这里,通过纯粹的基本方法,我们给出了严格的证明,即在初始假设的前提下,在适当的块长度选择假设下,Bennett,Bessette,Brassard,Salvail和Smolin提出的方法通常会收敛到非空的公共密钥。位串足够长。提供了有关长度要求的完整详细信息。此外,我们考虑到关于最终公共密钥的长度应选择哪个块长度以实现最佳性能的问题。本文的一个新的基本方面是显式利用有限域和纠错码,既可以检查生成的密钥是否相等,又可以用于构造各种哈希函数。传统上,这种检查是通过对比特的随机子集的奇偶校验执行几次比较来完成的。在这里,我们使用功能强大的纠错码方法给出了一个效率更高的过程。第8节介绍了更一般的情况。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号