CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK

The article outlines the possibility of increasing the privacy of cryptographic key generated in the conditions of data leakage of some of its values. Such a situation can occur in the formation of a common cryptographic key of a symmetric cryptosystem employing a quantum channel, listened by a cryp...

Full description

Saved in:
Bibliographic Details
Main Authors: U. F. Holikau, V. L. Pivovarov
Format: Article
Language:English
Published: Belarusian National Technical University 2016-07-01
Series:Системный анализ и прикладная информатика
Subjects:
Online Access:https://sapi.bntu.by/jour/article/view/108
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849398697810460672
author U. F. Holikau
V. L. Pivovarov
author_facet U. F. Holikau
V. L. Pivovarov
author_sort U. F. Holikau
collection DOAJ
description The article outlines the possibility of increasing the privacy of cryptographic key generated in the conditions of data leakage of some of its values. Such a situation can occur in the formation of a common cryptographic key of a symmetric cryptosystem employing a quantum channel, listened by a cryptanalyst, or other methods that do not make use of one-way functions. A method with the conversion parameters to increase the entropy of a generated secret random key sequences suggested. The essence of the procedure developed is that the subscribers A and B (secretly to a cryptanalyst), but in agreement with each other, choose some of the bits in the generated key sequence (further referred to as «tagged») and produce a pre-announced conversion of this sequence, using the data about the tagged bits.Since the amount and serial numbers of tagged bits are unknown to a cryptanalyst, the layout of the bits known to a cryptanalyst before randomly changes and becomes uncertain. The fundamental point of this method is to obtain tagged bits, the positions of which are known only to subscribers A and B without using the secure communication channel. One of the possible methods of obtaining tagged bits based on a random and independent inversion of a generated key sequence by the subscribers A and B and followed by the analysis of parities pairs of bits is analyzed. The efficiency of the method is evaluated.
format Article
id doaj-art-92d94020eb214584897293a95bfd737c
institution Kabale University
issn 2309-4923
2414-0481
language English
publishDate 2016-07-01
publisher Belarusian National Technical University
record_format Article
series Системный анализ и прикладная информатика
spelling doaj-art-92d94020eb214584897293a95bfd737c2025-08-20T03:38:31ZengBelarusian National Technical UniversityСистемный анализ и прикладная информатика2309-49232414-04812016-07-0102505692CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAKU. F. Holikau0V. L. Pivovarov1Belarusian National Technical UniversityBelarusian National Technical UniversityThe article outlines the possibility of increasing the privacy of cryptographic key generated in the conditions of data leakage of some of its values. Such a situation can occur in the formation of a common cryptographic key of a symmetric cryptosystem employing a quantum channel, listened by a cryptanalyst, or other methods that do not make use of one-way functions. A method with the conversion parameters to increase the entropy of a generated secret random key sequences suggested. The essence of the procedure developed is that the subscribers A and B (secretly to a cryptanalyst), but in agreement with each other, choose some of the bits in the generated key sequence (further referred to as «tagged») and produce a pre-announced conversion of this sequence, using the data about the tagged bits.Since the amount and serial numbers of tagged bits are unknown to a cryptanalyst, the layout of the bits known to a cryptanalyst before randomly changes and becomes uncertain. The fundamental point of this method is to obtain tagged bits, the positions of which are known only to subscribers A and B without using the secure communication channel. One of the possible methods of obtaining tagged bits based on a random and independent inversion of a generated key sequence by the subscribers A and B and followed by the analysis of parities pairs of bits is analyzed. The efficiency of the method is evaluated.https://sapi.bntu.by/jour/article/view/108cryptographic keydataleaksecret conversionincreased uncertainty
spellingShingle U. F. Holikau
V. L. Pivovarov
CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK
Системный анализ и прикладная информатика
cryptographic key
dataleak
secret conversion
increased uncertainty
title CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK
title_full CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK
title_fullStr CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK
title_full_unstemmed CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK
title_short CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK
title_sort cryptographic key improved privacy under the conditions of some of cryptographic key value data leak
topic cryptographic key
dataleak
secret conversion
increased uncertainty
url https://sapi.bntu.by/jour/article/view/108
work_keys_str_mv AT ufholikau cryptographickeyimprovedprivacyundertheconditionsofsomeofcryptographickeyvaluedataleak
AT vlpivovarov cryptographickeyimprovedprivacyundertheconditionsofsomeofcryptographickeyvaluedataleak