Preview

«System analysis and applied information science»

Advanced search

CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK

Abstract

The article outlines the possibility of increasing the privacy of cryptographic key generated in the conditions of data leakage of some of its values. Such a situation can occur in the formation of a common cryptographic key of a symmetric cryptosystem employing a quantum channel, listened by a cryptanalyst, or other methods that do not make use of one-way functions. A method with the conversion parameters to increase the entropy of a generated secret random key sequences suggested. The essence of the procedure developed is that the subscribers A and B (secretly to a cryptanalyst), but in agreement with each other, choose some of the bits in the generated key sequence (further referred to as «tagged») and produce a pre-announced conversion of this sequence, using the data about the tagged bits.

Since the amount and serial numbers of tagged bits are unknown to a cryptanalyst, the layout of the bits known to a cryptanalyst before randomly changes and becomes uncertain. The fundamental point of this method is to obtain tagged bits, the positions of which are known only to subscribers A and B without using the secure communication channel. One of the possible methods of obtaining tagged bits based on a random and independent inversion of a generated key sequence by the subscribers A and B and followed by the analysis of parities pairs of bits is analyzed. The efficiency of the method is evaluated.

About the Authors

U. F. Holikau
Belarusian National Technical University
Belarus


V. L. Pivovarov
Belarusian National Technical University
Belarus


References

1. Bennet, C. H. Quantum cryptography: quantum key distribution and coin tossing / C. H. Bennet, G. Brassard // Int. conf. on computers systems and signal processing. – Bangalore, 1984. P. 175–179.

2. Brassar, J. Modern cryptology / J. Brassar. – M. : Polymed, 1999. – 178 p.

3. Baumeister, D. The physics of quantum information / D. Baumester, A. Ekert, A. Tsailinger. – M. : Postmarket, 2002. – 276 p.

4. Method of cryptographic key distribution between subscribers: pat. 17856 Rep. Belarus: IPC 04L 9/08 (2006.01) / V. F. Golikov ; date publ.: 19.07.2011.

5. Golikov, V. F. Estimation of loss of confidentiality of non-classical methods of forming a cryptographic key / V. F. Golikov, F. Abdolvand // Informatika. – 2011. – № 2 (30). – P. 104–110.

6. Belyaev, Y. K. Probabilistic methods of sampling / Y. K. Belyaev. – M. : Science, 1975. – 407 p.


Review

For citations:


Holikau U.F., Pivovarov V.L. CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK. «System analysis and applied information science». 2016;(2):50-56. (In Russ.)

Views: 1733


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2309-4923 (Print)
ISSN 2414-0481 (Online)