{"title":"随机密码系统攻击与防御","authors":"G. Hussein","doi":"10.1109/ICCES.2006.320453","DOIUrl":null,"url":null,"abstract":"In this paper, an evaluation of (one time pad) OTP, Rabin everlasting encryption and two stage random number generator (TSRG) randomized cryptosystems are introduced. TSRG uses randomized encryption techniques for designing an algorithm of a provably secure cryptosystem for message exchange. A built-in TSRG RNG is a distinguishable primitive in the proposed cryptosystem design where instantaneous real time OTP-like data is generated. Most cryptography relies on unproven complexity assumptions like integer factorization being computationally hard, with the adversary limited by computing power. However, advances in cryptanalysis, unpublished researches and computing technology, especially in the emerging quantum cryptography, may make current cryptosystems insecure. Shannon's pessimistic result essentially denotes that if the adversary is all-powerful, then efficient practical solutions for information-theoretic security do not exist. However, the TSRG use the concept of dynamic modeling to achieve provable security based on insoluble problem with respect to attacker. This requires a secure way of exchanging of the OTP-like special seed to be expanded at the receiver side as well as preventing the attackers from mounting state compromise attacks. The paper also explains the relation among the three discussed cryptosystems and randomized encryption techniques","PeriodicalId":261853,"journal":{"name":"2006 International Conference on Computer Engineering and Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Randomized Cryptosystems Attacks and Defenses\",\"authors\":\"G. Hussein\",\"doi\":\"10.1109/ICCES.2006.320453\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, an evaluation of (one time pad) OTP, Rabin everlasting encryption and two stage random number generator (TSRG) randomized cryptosystems are introduced. TSRG uses randomized encryption techniques for designing an algorithm of a provably secure cryptosystem for message exchange. A built-in TSRG RNG is a distinguishable primitive in the proposed cryptosystem design where instantaneous real time OTP-like data is generated. Most cryptography relies on unproven complexity assumptions like integer factorization being computationally hard, with the adversary limited by computing power. However, advances in cryptanalysis, unpublished researches and computing technology, especially in the emerging quantum cryptography, may make current cryptosystems insecure. Shannon's pessimistic result essentially denotes that if the adversary is all-powerful, then efficient practical solutions for information-theoretic security do not exist. However, the TSRG use the concept of dynamic modeling to achieve provable security based on insoluble problem with respect to attacker. This requires a secure way of exchanging of the OTP-like special seed to be expanded at the receiver side as well as preventing the attackers from mounting state compromise attacks. The paper also explains the relation among the three discussed cryptosystems and randomized encryption techniques\",\"PeriodicalId\":261853,\"journal\":{\"name\":\"2006 International Conference on Computer Engineering and Systems\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 International Conference on Computer Engineering and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCES.2006.320453\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Conference on Computer Engineering and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2006.320453","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, an evaluation of (one time pad) OTP, Rabin everlasting encryption and two stage random number generator (TSRG) randomized cryptosystems are introduced. TSRG uses randomized encryption techniques for designing an algorithm of a provably secure cryptosystem for message exchange. A built-in TSRG RNG is a distinguishable primitive in the proposed cryptosystem design where instantaneous real time OTP-like data is generated. Most cryptography relies on unproven complexity assumptions like integer factorization being computationally hard, with the adversary limited by computing power. However, advances in cryptanalysis, unpublished researches and computing technology, especially in the emerging quantum cryptography, may make current cryptosystems insecure. Shannon's pessimistic result essentially denotes that if the adversary is all-powerful, then efficient practical solutions for information-theoretic security do not exist. However, the TSRG use the concept of dynamic modeling to achieve provable security based on insoluble problem with respect to attacker. This requires a secure way of exchanging of the OTP-like special seed to be expanded at the receiver side as well as preventing the attackers from mounting state compromise attacks. The paper also explains the relation among the three discussed cryptosystems and randomized encryption techniques