Title :
On the (non)universality of the one-time pad
Author :
Dodis, Yevgeniy ; Spencer, Joel
Author_Institution :
Dept. of Comput. Sci., New York Univ., NY, USA
fDate :
6/24/1905 12:00:00 AM
Abstract :
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g., encryption) must be probabilistic. We initiate the quantitative study concerning feasibility of building secure cryptographic primitives using imperfect random sources. Specifically, we concentrate on symmetric-key encryption and message authentication, where the shared secret key comes from an imperfect random source instead of being assumed truly random. In each case, we compare the class of "cryptographic" sources for the task at hand with the classes of "extractable" and "simulatable" sources, where: (1) "cryptographic" refers to sources for which the corresponding symmetric-key primitive can be built; (2) "extractable" refers to a very narrow class of sources from which one can extract nearly perfect randomness; and (3) "simulatable" refers to a very general class of weak random sources which are known to suffice for BPP simulation. For both encryption and authentication, we show that the corresponding cryptographic sources lie strictly in between extractable and simulatable sources, which implies that "cryptographic usage" of randomness is more demanding than the corresponding "algorithmic usage", but still does not require perfect randomness. Interestingly, cryptographic sources for encryption and authentication are also quite different from each other, which suggests that there might not be an elegant way to describe imperfect sources sufficient for "general cryptographic use". We believe that our initial investigation in this new area will inspire a lot of further research.
Keywords :
cryptography; message authentication; random processes; simulation; BPP simulation; cryptographic primitives; cryptographic sources; cryptography; encryption; extractable sources; general cryptographic use; imperfect random source; imperfect random sources; message authentication; nearly perfect randomness; one-time pad universality; probabilistic algorithms; randomization; secret keys; secure cryptographic primitives; shared secret key; simulatable sources; symmetric-key encryption; symmetric-key primitive; weak random sources; Approximation algorithms; Atherosclerosis; Computational modeling; Computer science; Cryptographic protocols; Cryptography; Distributed computing; History; Message authentication; Testing;
Conference_Titel :
Foundations of Computer Science, 2002. Proceedings. The 43rd Annual IEEE Symposium on
Print_ISBN :
0-7695-1822-2
DOI :
10.1109/SFCS.2002.1181962