Author
Listed:
- Milan Milosavljević
(Vlatacom Institute of High Technology, Milutina Milankovica 5, 11070 Belgrade, Serbia)
- Jelica Radomirović
(Vlatacom Institute of High Technology, Milutina Milankovica 5, 11070 Belgrade, Serbia
School of Electrical Engineering, Belgrade University, Bulevar kralja Aleksandra 73, 11120 Belgrade, Serbia)
- Tomislav Unkašević
(Vlatacom Institute of High Technology, Milutina Milankovica 5, 11070 Belgrade, Serbia)
- Boško Božilović
(Vlatacom Institute of High Technology, Milutina Milankovica 5, 11070 Belgrade, Serbia)
Abstract
This paper introduces a class of symmetric ciphering systems with a finite secret key, which provides ideal secrecy, autonomy in key generation and distribution, and robustness against the probabilistic structure of messages (the Ideally Secret Autonomous Robust (ISAR) system). The ISAR system is based on wiretap polar codes constructed over an artificial wiretap channel with a maximum secrecy capacity of 0.5. The system autonomously maintains a minimum level of key equivocation by continuously refreshing secret keys without additional key generation and distribution infrastructure. Moreover, it can transform any stream ciphering system with a finite secret key of known length into an ISAR system without knowing and/or changing its algorithm. Therefore, this class of system strongly supports privacy, a critical requirement for contemporary security systems. The ISAR system’s reliance on wiretap polar coding for strong secrecy ensures resistance to passive known plaintext attacks. Furthermore, resistance to passive attacks on generated refreshing keys follows directly from ideal secrecy and autonomy. The results presented offer an efficient methodology for synthesizing this class of systems with predetermined security margins and a complexity of the order of n log n , where n is the block length of the applied polar code.
Suggested Citation
Milan Milosavljević & Jelica Radomirović & Tomislav Unkašević & Boško Božilović, 2024.
"One Class of Ideally Secret Autonomous Symmetric Ciphering Systems Based on Wiretap Polar Codes,"
Mathematics, MDPI, vol. 12(23), pages 1-24, November.
Handle:
RePEc:gam:jmathe:v:12:y:2024:i:23:p:3724-:d:1530957
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:12:y:2024:i:23:p:3724-:d:1530957. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.