Stream Keys by Irrational Numbers

Page 1

Stream Keys by Irrational Numbers MIHAI CĂTĂLIN NEAGOE Faculty of Applied Sciences, University "Politehnica" of Bucharest, Splaiul Independenţei nr. 313, sector 6, Bucureşti, Cod Postal: 060042, ROMANIA mihaineagoe2003@gmail.com Abstract: This article approaches the possibility of the use of irrational numbers in cryptography. We introduce a family of stream ciphers, whose stream keys are generated through a chosen irrational number. We shall prove that these stream ciphers possess the perfect secrecy (Shannon) property under non-restrictive general conditions.

Key words: cryptosystem, plaintext space, space of cryptograms, stream cipher, stream key, cryptanalysis, perfect secrecy, irrational numbers, uniform distribution, Vernam's one-time-pad.

1. Introduction The main problem in the design of a secure stream cipher consists in the manner by which the stream keys are generated. The stream keys have to satisfy conditions such as: (C1) the key length must theoretically comprise infinitely many items, and it must cover the length of the plaintext which will be encrypted; (C2) the key structure must realize both confusion and diffusion of the symbols in the resulting cryptogram: it has to look like a "random" sequence of letters; (C3) in order to guarantee a higher (or highest, or a perfect) secrecy, it is desirable that the use of the stream key is one-time-pad, i.e. the key is used only one time and changed each time a new encryption session comes in order for a new plaintext. Stream ciphers have some disadvantages: (D1) when the randomness of a stream key is realized by a natural physical phenomenon, it is difficult to realize the same random phenomenon in order to obtain -at the

receiving point- the key for decryption; therefore such stream keys are realized by the use of pseudo-random number generators; (D2) the stream ciphers are vulnerable to attacks by known plaintext; (D3) the secret key must be known both at the sender point and at the receiving point of the messages; (D4) the confidential communication of the effective encryptiondecryption key, whose length is as long as the length of the message, may itself be vulnerable to attacks. The later possibility is usually avoided providing that the stream keys generating algorithm is known in advance to both sender point and receiver point. Therefore, in such a case, there is no need to communicate the effective encryption-decryption long key. For an introduction in the design of a secure stream cipher, the reader may consult [2], [8], [1], and [6]. Our paper presents a manner to obtain stream keys by irrational numbers. The set of irrational numbers has uncountable infinitely


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Stream Keys by Irrational Numbers by Mihai Neagoe - Issuu