Advance in Applied Cryptography Theory: Survey and Some New Results. Part 2. Keyless Cryptography
- Authors: Korzhik V.I.1, Yakovlev V.A.1, Starostin V.S.1, Buinevich M.V.2
-
Affiliations:
- The Bonch-Bruevich Saint Petersburg State University of Telecommunications
- Saint Petersburg University of State Fire Service of Emercom of Russia
- Issue: Vol 10, No 6 (2024)
- Pages: 79-98
- Section: INFORMATION TECHNOLOGIES AND TELECOMMUNICATION
- URL: https://ogarev-online.ru/1813-324X/article/view/278239
- EDN: https://elibrary.ru/HPBOWG
- ID: 278239
Cite item
Full Text
Abstract
About the authors
V. I. Korzhik
The Bonch-Bruevich Saint Petersburg State University of Telecommunications
Email: val-korzhik@yandex.ru
ORCID iD: 0000-0002-8347-6527
V. A. Yakovlev
The Bonch-Bruevich Saint Petersburg State University of Telecommunications
Email: yakovlev.va@sut.ru
ORCID iD: 0009-0007-2861-9605
SPIN-code: 5273-8655
V. S. Starostin
The Bonch-Bruevich Saint Petersburg State University of Telecommunications
Email: vm.ffp@sut.ru
ORCID iD: 0009-0000-2939-1971
SPIN-code: 8998-5162
M. V. Buinevich
Saint Petersburg University of State Fire Service of Emercom of Russia
Email: bmv1958@yandex.ru
ORCID iD: 0000-0001-8146-0022
SPIN-code: 9339-3750
References
- Alpern B., Schneider F.B. Key exchange using ‘keyless cryptography’ // Information Processing Letters. 1983. Vol. 16. Iss. 2. PP. 79‒81. doi: 10.1016/0020-0190(83)90029-7
- Korzhik V. Keyless cryptography // Proceedings of the 9th International Conference on System Administration, Networking and Security (Orlando, USA). 2000.
- Korzhik V., Bakin M. Information-theoretical Secure Keyless intensification // Proceedings of the 2000 IEEE International Symposium on Information Theory (Sorrento, Italy, 25‒30 June 2000). Piscataway: IEEE Press, 2000. doi: 10.1109/ISIT.2000.866310
- Korzhik V. Keyless cryptography // Invited Talk at Security Seminar at CERIAS Purdue University. 2001
- Mukherjee A., Fakoorian S.A.A., Huang J., Swindlehurst A.L. Principles of Physical Layer Security in Multiuser Wireless Network A. Survey // IEEE Communications Surveys & Tutorials. 2014. Vol. 16. Iss. 3. PP. 1550‒1573. doi: 10.1109/SURV.2014.012314.00178
- Wyner A.D. The Wire-tap channel // Bell System Technical Journal. 1975. Vol. 54. Iss. 8. PP. 1355‒1387. doi: 10.1002/j.1538-7305.1975.tb02040.x
- Bennett C.H., Bessette F., Brassard G., Salvail L., Smolin J. Experimental quantum cryptography // Journal of Cryptology. 1992. Vol. 5. PP. 3‒28. doi: 10.1007/BF00191318
- Кушнир Д.В. Исследование и разработка методов распределения конфиденциальных данных по квантовым каналам. Автореф. дис. канд. техн. наук. СПб.: СПбГУТ, 1996. 16 с. EDN:ZJDTTT
- Коржик В.И., Яковлев В.А. Основы криптографии. СПб.: Интермедия, 2016. 296 с. EDN:WEQWMN
- Korzhik V., Kushnir D. Key sharing based on the wire-tap channel type ii concept with noisy main channel // Proceedings of the International Conference on the Theory and Applications of Crypotology and Information Security (ASIACRYPT '96, Kyongju, Korea, 3‒7 November 1996). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1996. Vol. 1163. PP. 210‒217. doi: 10.1007/BFb0034848
- Liu Y., Zhang W.J., Jiang C., Chen J.P., Zhang C., Pan W.X., et al. Experimental Twin-Field Quantum Key Distribution over 1000 km Fiber Distance // Physical Review Letters. 2023. Vol. 130. P. 210801. doi: 10.1103/PhysRevLett.130.210801
- Milov M., Pham T.M., Chorti A., Barreto A.N., Fettweis G. Physical Layer Security ‒ From Theory to Practice // IEEE BITS the Information Theory Magazine. 2023. Vol. 3. Iss. 2. PP. 67‒79. doi: 10.1109/MBITS.2023.3338569
- Шеннон К.Э. Работы по теории информации и кибернетике. М.: Издательство иностранной литературы, 1963. 829 с.
- Maurer U.M. Secret key agreement by public discussion based on common information // IEEE Transactions on Information Theory. 1993. Vol. 39. Iss. 3. PP. 733‒742. doi: 10.1109/18.256484
- Коржик В.И., Яковлев В.А. Неасимптотическая оценка эффективности кодового зашумления в каналах с отводом // Проблемы передачи информации. 1991. № 4. С. 223‒228.
- Петерсон У., Уэлнод Э. Коды, исправленные ошибки. М.: Мир, 1976.
- Коржик В.И., Яковлев В.А. Защита информации от утечки за счет побочных электромагнитных излучений и наводок на основе способа кодового зашумления // Информатика и вычислительная техника. 1993. Т. 8. № 1-2. С. 61‒66.
- Korzhik V., Morales-Luna G., Balakirsky V.B. Privacy amplification theorem for noisy main channel // Proceedings of the 4th International Conference on Information Security (ISC 2001, Malaga, Spain, 1‒3 October 2001). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2001. Vol. 2200. PP. 18‒26. doi: 10.1007/3-540-45439-X_2
- Yakovlev V., Korzhik V., G.Morales Luna Key Distribution Protocol Based on Noisy Channels in Presence of Active Adversary // IEEE Transactions on Information Theory. 2008. Vol. 54. Iss. 6. PP. 2535‒2550. doi: 10.1109/TIT.2008.921689
- Шнайер Б. Прикладная криптография. М.: Триумф, 2002.
- Korzhik V., Starostin V., Yakovlev V., Kabardov M., Krasov A., Adadurov S. Advance in Keyless Cryptography. Chapter 6 // In: Ramakrishnan S. (ed.) Lightweight Cryptographic Techniques and Cybersecurity Approaches. 2022. PP. 97‒117. doi: 10.5772/intechopen.104429
- Tilborg H.C.A. Encyclopedia of Cryptography and Security. Springer, 2005.
- Myasnikov A.G., Shpilrain V., Ushakov A. Non-commutative Cryptography and Group-theoretic Problems. American Mathematical Society, 2011. 385 p.
- Goldreich O. Goldwasser S., Halevi S. Public-key cryptosystems from Lattice reduction problems // Proceedings of the 17th Annual International Cryptology Conference (CRYPTO '97, Santa Barbara, USA, 17‒21 August 1997). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1997. Vol. 1294. PP. 112‒131. doi: 10.1007/BFb0052231
- Dean T., Goldsmith Aj. Physical layer cryptography through massive MIMO // Proceedings of the 2013 IEEE Information Theory Workshop (ITW, 9‒13 September 2013, Seville, Spain). Piscataway: IEEE, 2013. PP. 1‒3. doi: 10.1109/ITW.2013.6691222
- Ben-Israel A., Greville T.N.E. Generalized Inverses: Theory and Applications. Springer, 2003.
- Steinfeld R., Sakzad A. On massive MIMO physical layer cryptosystems // Proceedings of IEEE Information Theory Workshop ‒ Fall (ITW, Jeju, Korea (South), 11‒15 October 2015). IEEE, 2015. PP. 292‒296. doi: 10.1109/ITWF.2015.7360782
- Aono T., Higuchi K., Ohira T., Komiyama B., Sasaoka H. Wireless secret key generation exploiting reactance-domain scalar response of multipath fadiny cannels // IEEE Transactions on Antennas and Propagation. 2005. Vol. 53. Iss. 11. PP. 3776‒3784. doi: 10.1109/TAP.2005.858853
- Korzhik V., Yakovlev V., Kovajkin Y. Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna // International Journal of Advanced Computer Science and Applications. 2012. Vol. 3. Iss. 1. PP. 172‒178.
- Qin D., Ding Z. Exploiting Multi Antenna Non-Reciprocal Channels for Share Secret Key Generation // IEEE Transactions on Information Forensics and Security. 2016. Vol. 11. Iss. 12. PP. 2691‒2705. doi: 10.1109/TIFS.2016.2594143
- Yakovlev V., Korzhik V., Starostin V., Lapshin A. Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions // Proceedings of the 32nd Conference of Open Innovations Association FRUCT (Tampere, Finland, 9‒11 November 2022). FRUCT 32, 2022. PP. 300‒307. doi: 10.23919/FRUCT56874.2022.9953895
- Lai E., Gamal H.El., Poor H.V. The Wiretap Channel with Feedback Encryption over the Cannel // IEEE Transactions on Information Theory. 2008. Vol. 54. Iss. 11. PP. 5059‒5067. doi: 10.1109/TIT.2008.929914
- Korzhik V., Yakovlev V., Starostin V., Lapshin A. Vulnerability of the Key Sharing Protocol Executing over the Noiseless Public Cannels with Feedback // Proceedings of the 35th Conference of Open Innovations Association FRUCT-35 (Tampere, Finland, 24‒26 April 2024). FRUCT-35, 2024. PP. 374‒379 doi: 10.23919/FRUCT61870.2024.10516344
Supplementary files
