Quantum Noise Randomized Ciphers
Ranjith Nair,Horace P. Yuen,Eric Corndorf,Eric Corndorf,Takami Eguchi,Takami Eguchi,Prem Kumar +6 more
Reads0
Chats0
TLDR
It is shown how {alpha}{eta} used in conjunction with any standard stream cipher such as the Advanced Encryption Standard provides an additional, qualitatively different layer of security from physical encryption against known-plaintext attacks on the key.Abstract:
We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security. We describe a concrete system known as $\ensuremath{\alpha}\ensuremath{\eta}$ and show that it is equivalent to a random cipher in which the required randomization is affected by coherent-state quantum noise. We describe the currently known security features of $\ensuremath{\alpha}\ensuremath{\eta}$ and similar systems, including lower bounds on the unicity distances against ciphertext-only and known-plaintext attacks. We show how $\ensuremath{\alpha}\ensuremath{\eta}$ used in conjunction with any standard stream cipher such as the Advanced Encryption Standard provides an additional, qualitatively different layer of security from physical encryption against known-plaintext attacks on the key. We refute some claims in the literature that $\ensuremath{\alpha}\ensuremath{\eta}$ is equivalent to a nonrandom stream cipher.read more
Citations
More filters
Journal ArticleDOI
Key Generation: Foundations and a New Quantum Approach
TL;DR: It is shown that the attacker's optimal probability of finding the generated key is an indispensable measure of security and that this probability limits the possibility of privacy amplification and the amount of fresh key that can be generated.
Journal ArticleDOI
Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol
TL;DR: This paper presents the complexity-theoretic security analysis on some models of the Y00 protocol with nonlinear pseudo-random-number-generator and quantum noise diffusion mapping (QDM) and shows that the Y 00 protocol has a potential which cannot be realized by conventional cryptography and that it goes beyond mathematical encryption with physical encryption.
Journal ArticleDOI
Practical physical-layer encryption: The marriage of optical noise with traditional cryptography
TL;DR: An emerging method of encryption suitable for high-speed optical communication networks which combines traditional electronic cryptographic algorithms with the physical effect of optical noise of quantum origin to create a highly secure method of secret communications.
Proceedings ArticleDOI
Noise-enhanced encryption for physical layer security in an OFDM radio
D. R. Reilly,Gregory S. Kanter +1 more
TL;DR: A physical-layer modulation scheme previously used for enhancing security in the optical domain to an OFDM radio link is adapted, using a cryptographic pseudo-random number generator and adding a small amount of truly random noise at the transmitter to enhance security.
Proceedings ArticleDOI
Masked-OFDM: A physical layer encryption for future OFDM applications
TL;DR: This paper presents a symmetric key physical layer encryption for OFDM systems, termed Masked-OFDM (MOFDM), which becomes practically undetectable by a potential eavesdropper by being masked in a non-orthogonal FDM signal of approximately the same overall bandwidth.
References
More filters
Book
Elements of information theory
Thomas M. Cover,Joy A. Thomas +1 more
TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Journal ArticleDOI
Quantum Cryptography
TL;DR: The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.
Book
Quantum detection and estimation theory
TL;DR: In this article, the optimum procedure for choosing between two hypotheses, and an approximate procedure valid at small signal-to-noise ratios and called threshold detection, are presented, and a quantum counterpart of the Cramer-Rao inequality of conventional statistics sets a lower bound to the mean-square errors of such estimates.
Book
Cryptography: Theory and Practice
TL;DR: The object of the book is to produce a general, comprehensive textbook that treats all the essential core areas of cryptography.