Title :
Stream deniable-encryption computationally indistinguishable from probabilistic ciphering
Author :
Berezin, A.N. ; Moldovyan, A.A. ; Moldovyan, N.A.
Abstract :
For the first time it is proposed a stream deniable-encryption algorithm. The algorithm generates cryptogram that is computationally indistinguishable from the cryptogram produced by some probabilistic encryption algorithm, called associated probabilistic algorithm, while ciphering a fake message with a fake key. When the sender and receiver of the message are coerced to open the encryption key, they open the fake key with which the cryptogram is transformed into the fake message. To recover the secret message from the cryptogram the receiver uses the secret key. The algorithm is constructed on the base of some secure hash function with which two key streams are generated. The key streams are mixed with secret data stream and with fake data stream so that cryptograms looks like the ciphertext produced by the probabilistic encryption of the fake message with the fake key.
Keywords :
message authentication; private key cryptography; probability; associated probabilistic algorithm; ciphertext; computationally indistinguishable stream deniable-encryption; cryptogram; encryption key; fake data stream; fake key; fake message ciphering; message receiver; message sender; probabilistic ciphering; probabilistic encryption algorithm; secret data stream; secret message recovery; secure hash function; Algorithm design and analysis; Encryption; Polynomials; Probabilistic logic; Receivers; Transforms; cryptography; deniable encryption; encryption; key stream; probabilistic encryption; stream ciphering;
Conference_Titel :
Soft Computing and Measurements (SCM), 2015 XVIII International Conference on
Conference_Location :
St. Petersburg
Print_ISBN :
978-1-4673-6960-2
DOI :
10.1109/SCM.2015.7190395