Industrial Networks and Intelligent Systems. 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedings

Research Article

Method for Pseudo-probabilistic Block Encryption

Download
202 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-74176-5_28,
        author={Moldovyan Nikolay Andreevich and Moldovyan Alexander Andreevich and Tam Nguyen Duc and Hai Nguyen Nam and Minh Nguyen Hieu},
        title={Method for Pseudo-probabilistic Block Encryption},
        proceedings={Industrial Networks and Intelligent Systems. 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedings},
        proceedings_a={INISCOM},
        year={2018},
        month={1},
        keywords={Block cipher Plan-ahead Shared-key Pseudo-probabilistic cipher Symmetric Deniable Encryption},
        doi={10.1007/978-3-319-74176-5_28}
    }
    
  • Moldovyan Nikolay Andreevich
    Moldovyan Alexander Andreevich
    Tam Nguyen Duc
    Hai Nguyen Nam
    Minh Nguyen Hieu
    Year: 2018
    Method for Pseudo-probabilistic Block Encryption
    INISCOM
    Springer
    DOI: 10.1007/978-3-319-74176-5_28
Moldovyan Nikolay Andreevich1,*, Moldovyan Alexander Andreevich1,*, Tam Nguyen Duc2,*, Hai Nguyen Nam2,*, Minh Nguyen Hieu2,*
  • 1: St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences
  • 2: Academy of Cryptography Techniques
*Contact email: nmold@mail.ru, ma@mail.ru, nguenductamkma@gmail.com, nnhaivn61@gmail.com, hieuminhmta@gmail.com

Abstract

There is considered implementation of the plan-ahead share-key deniable encryption algorithms that produce the cryptogram that satisfy criterion of the computational indistinguishability from probabilistic encryption of the fake message. This paper introduces a general design of the pseudoprobabilistic block ciphers. The proposed method includes encryption of the secret message block and the fake message block followed by a transformation procedure mapping the pair of intermediate ciphertext blocks into a single block of the output ciphertext. The transformation procedure represents solving the system of two linear congruencies.