Context-Aware Systems and Applications, and Nature of Computation and Communication. 7th EAI International Conference, ICCASA 2018, and 4th EAI International Conference, ICTCC 2018, Viet Tri City, Vietnam, November 22–23, 2018, Proceedings

Research Article

Stream Pseudo-probabilistic Ciphers

Download
119 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-06152-4_4,
        author={Nikolay Moldovyan and Dmitriy Moldovyan and Quang Le and Long Nguyen and Sy Ho and Hieu Nguyen},
        title={Stream Pseudo-probabilistic Ciphers},
        proceedings={Context-Aware Systems and Applications, and Nature of Computation and Communication. 7th EAI International Conference, ICCASA 2018, and 4th EAI International Conference, ICTCC 2018, Viet Tri City, Vietnam, November 22--23, 2018, Proceedings},
        proceedings_a={ICCASA \& ICTCC},
        year={2019},
        month={1},
        keywords={Stream cipher Pseudo-probabilistic encryption Probabilistic cipher Fake message Secret message},
        doi={10.1007/978-3-030-06152-4_4}
    }
    
  • Nikolay Moldovyan
    Dmitriy Moldovyan
    Quang Le
    Long Nguyen
    Sy Ho
    Hieu Nguyen
    Year: 2019
    Stream Pseudo-probabilistic Ciphers
    ICCASA & ICTCC
    Springer
    DOI: 10.1007/978-3-030-06152-4_4
Nikolay Moldovyan1, Dmitriy Moldovyan1, Quang Le2, Long Nguyen3, Sy Ho4, Hieu Nguyen4,*
  • 1: St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences
  • 2: Vietnam National University
  • 3: Vietnam Academy of Science and Technology
  • 4: Academy of Cryptography Techniques
*Contact email: hieuminhmta@gmail.com

Abstract

The paper considers methods and algorithms for stream pseudo-probabilistic encryption and introduces a novel design of such ciphers. In the known algorithms of such type two independent messages (fake and secret ones) are encrypted simultaneously (with using two different keys, fake and secret) and the produced ciphertext is computationally indistinguishable from the ciphertext produced by process of the probabilistic encryption of the fake message using the fake key. However in the known stream pseudo-probabilistic encryption schemes the algorithms for decrypting the fake and secret messages do not coincide completely. Therefore a potential attacker can use the last fact to distinguish the pseudo-probabilistic encryption from the probabilistic one. To provide resistance to such potential attacks in the paper there are proposed stream pseudo-probabilistic ciphers satisfying criterion of the sameness of the algorithms for decrypting the fake and secret messages. The introduced ciphers are sufficiently fast and represent interest for practical application to provide confidentiality of the communication protocols performed using public channels. The randomized pseudo-probabilistic stream ciphers have been also designed.