INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS

Stefan Rass, Peter Schartner

2011

Abstract

In light of the vast number of existing cryptographic protocols, performance tradeoffs become a major obstacle when selecting one for practical usage. For instance, protocols known to be secure but inefficient compete with others being efficient but offering less security. We tackle such tradeoffs by investigating sequences of random protocol instances randomized protocols) and analyzing the rate at which information leaks from such a sequence. Remarkably, it can be demonstrated that the mutual information between an eavesdropped ciphertext and the plain text decays exponentially fast with the length of the protocol sequence. Using simple tools from game-theory, we devise a generic technique to assemble several protocols of different performance into a single protocol, unifying the advantages of its ingredients. We call this a hybrid randomized protocol. We illustrate our technique by using simplified multipath transmission as an example, while observing that our general construction is in no way restricted to this scenario.

References

  1. Alomair, B. and Poovendran, R. (2009). Information theoretically secure encryption with almost free authentication. Journal of Universal Computer Science, 15(15):2937-2956.
  2. Alomair, B. and Poovendran, R. (2009). Information theoretically secure encryption with almost free authentication. Journal of Universal Computer Science, 15(15):2937-2956.
  3. Alwen, J., Dodis, Y., and Wichs, D. (2009). Survey: Leakage resilience and the bounded retrieval model. In Kurosawa, K., editor, Proceedings of the 4th International Conference on Information-Theoretic Security (ICITS), pages 1-18. Springer.
  4. Alwen, J., Dodis, Y., and Wichs, D. (2009). Survey: Leakage resilience and the bounded retrieval model. In Kurosawa, K., editor, Proceedings of the 4th International Conference on Information-Theoretic Security (ICITS), pages 1-18. Springer.
  5. Araki, T. (2008). Almost secure 1-round message transmission scheme with polynomial-time message decryption. In Safavi-Naini, R., editor, Proceedings of the 3rd International Conference on InformationTheoretic Security (ICITS), pages 2-13. Springer.
  6. Araki, T. (2008). Almost secure 1-round message transmission scheme with polynomial-time message decryption. In Safavi-Naini, R., editor, Proceedings of the 3rd International Conference on InformationTheoretic Security (ICITS), pages 2-13. Springer.
  7. Ashwin Kumar, M., Goundan, P. R., Srinathan, K., and Pandu Rangan, C. (2002). On perfectly secure communication over arbitrary networks. In PODC 7802: Proceedings of the twenty-first annual symposium on Principles of distributed computing, pages 193-202, New York, NY, USA. ACM.
  8. Ashwin Kumar, M., Goundan, P. R., Srinathan, K., and Pandu Rangan, C. (2002). On perfectly secure communication over arbitrary networks. In PODC 7802: Proceedings of the twenty-first annual symposium on Principles of distributed computing, pages 193-202, New York, NY, USA. ACM.
  9. Fitzi, M., Franklin, M. K., Garay, J., and Vardhan, S. H. (2007). Towards optimal and efficient perfectly secure message transmission. In Vadhan, S., editor, Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Lecture Notes in Computer Science LNCS 4392, pages 311-322. Springer.
  10. Fitzi, M., Franklin, M. K., Garay, J., and Vardhan, S. H. (2007). Towards optimal and efficient perfectly secure message transmission. In Vadhan, S., editor, Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Lecture Notes in Computer Science LNCS 4392, pages 311-322. Springer.
  11. Franklin, M. and Wright, R. (2000). Secure communication in minimal connectivity models. Journal of Cryptology, 13(1):9-30.
  12. Franklin, M. and Wright, R. (2000). Secure communication in minimal connectivity models. Journal of Cryptology, 13(1):9-30.
  13. Franklin, M. and Yung, M. (1995). Secure hypergraphs: privacy from partial broadcast. In Proceedings of the twenty-seventh annual ACM symposium on Theory of computing, STOC 7895, pages 36-44, New York, NY, USA. ACM.
  14. Franklin, M. and Yung, M. (1995). Secure hypergraphs: privacy from partial broadcast. In Proceedings of the twenty-seventh annual ACM symposium on Theory of computing, STOC 7895, pages 36-44, New York, NY, USA. ACM.
  15. Gibbons, R. (1992). A Primer in Game Theory. Pearson Education Ltd.
  16. Gibbons, R. (1992). A Primer in Game Theory. Pearson Education Ltd.
  17. Gu, Y., Fu, Y., Li, Y., and Dong, X. (2005). A generic model for symbolic analyzing security protocols. In The Fifth International Conference on Computer and Information Technology (CIT), pages 680-684.
  18. Gu, Y., Fu, Y., Li, Y., and Dong, X. (2005). A generic model for symbolic analyzing security protocols. In The Fifth International Conference on Computer and Information Technology (CIT), pages 680-684.
  19. Hanaoka, G., Shikata, J., Hanaoka, Y., and Imai, H. (2005). Unconditionally secure anonymous encryption and group authentication. The Computer Journal, 49(3):310-321.
  20. Hanaoka, G., Shikata, J., Hanaoka, Y., and Imai, H. (2005). Unconditionally secure anonymous encryption and group authentication. The Computer Journal, 49(3):310-321.
  21. Koski, T. and Noble, J. M. (2009). Bayesian Networks. Wiley Series in Probability and Statistics. Wiley.
  22. Koski, T. and Noble, J. M. (2009). Bayesian Networks. Wiley Series in Probability and Statistics. Wiley.
  23. Kurosawa, K. and Suzuki, K. (2007). Almost secure (1- round, n-channel) message transmission scheme. In Desmedt, Y., editor, Proceedings of the Second International Conference on Information-Theoretic Security (ICTIS), pages 99-112. Springer.
  24. Kurosawa, K. and Suzuki, K. (2007). Almost secure (1- round, n-channel) message transmission scheme. In Desmedt, Y., editor, Proceedings of the Second International Conference on Information-Theoretic Security (ICTIS), pages 99-112. Springer.
  25. Nash, J. F. (1951). Non-cooperative games. Annals of Mathematics, 54:286-295.
  26. Nash, J. F. (1951). Non-cooperative games. Annals of Mathematics, 54:286-295.
  27. Noman, A. (2008). A generic framework for defining security environments of wireless sensor networks. In International Conference on Electrical and Computer Engineering (ICECE), pages 924-929.
  28. Noman, A. (2008). A generic framework for defining security environments of wireless sensor networks. In International Conference on Electrical and Computer Engineering (ICECE), pages 924-929.
  29. Poels, K., Tuyls, P., and Schoenmakers, B. (2005). Generic security proof of quantum key exchange using squeezed states. In Proceedings of the International Symposium on Information Theory (ISIT), pages 1612-1616.
  30. Poels, K., Tuyls, P., and Schoenmakers, B. (2005). Generic security proof of quantum key exchange using squeezed states. In Proceedings of the International Symposium on Information Theory (ISIT), pages 1612-1616.
  31. Rass, S. and Schartner, P. (2010). A unified framework for the analysis of availability, reliability and security, with applications to quantum networks. IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews, 40(5):107-119.
  32. Rass, S. and Schartner, P. (2010). A unified framework for the analysis of availability, reliability and security, with applications to quantum networks. IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews, 40(5):107-119.
  33. Rivest, R. L. (1997). All-or-nothing encryption and the package transform. In Proceedings of the 4th International Workshop on Fast Software Encryption, FSE 7897, pages 210-218, London, UK. Springer-Verlag.
  34. Rivest, R. L. (1997). All-or-nothing encryption and the package transform. In Proceedings of the 4th International Workshop on Fast Software Encryption, FSE 7897, pages 210-218, London, UK. Springer-Verlag.
  35. Safavi-Naini, R., Wang, S., and Desmedt, Y. (2007). Unconditionally secure ring authentication. In Proceedings of the 2nd ACM symposium on Information, computer and communications security, ASIACCS 7807, pages 173-181, New York, NY, USA. ACM.
  36. Safavi-Naini, R., Wang, S., and Desmedt, Y. (2007). Unconditionally secure ring authentication. In Proceedings of the 2nd ACM symposium on Information, computer and communications security, ASIACCS 7807, pages 173-181, New York, NY, USA. ACM.
  37. Shannon, C. (1948). A Mathematical Theory of Communication. Bell System Technical Journal, 27:379-423 and 623-656.
  38. Shannon, C. (1948). A Mathematical Theory of Communication. Bell System Technical Journal, 27:379-423 and 623-656.
  39. Shannon, C. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28:656-715.
  40. Shannon, C. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28:656-715.
  41. Smith, W. D. (2005). Tail bound for sums of bounded random variables. http://www.math.temple.edu/~wds/ homepage/works.html.
  42. Smith, W. D. (2005). Tail bound for sums of bounded random variables. http://www.math.temple.edu/~wds/ homepage/works.html.
  43. Srinathan, K., Narayanan, A., and Pandu Rangan, C. (2004). Optimal perfectly secure message transmission. In CRYPTO, pages 545-561.
  44. Srinathan, K., Narayanan, A., and Pandu Rangan, C. (2004). Optimal perfectly secure message transmission. In CRYPTO, pages 545-561.
  45. Srinathan, K., Pandu Rangan, C., and Kumaresan, R. (2007). On exponential lower bound for protocols for reliable communication in networks. In Desmedt, Y., editor, Proceedings of the Second International Conference on Information-Theoretic Security (ICTIS), pages 89-98. Springer.
  46. Srinathan, K., Pandu Rangan, C., and Kumaresan, R. (2007). On exponential lower bound for protocols for reliable communication in networks. In Desmedt, Y., editor, Proceedings of the Second International Conference on Information-Theoretic Security (ICTIS), pages 89-98. Springer.
  47. Stinson, D. R. (2001). Something about all or nothing (transforms). Designs, Codes and Cryptography, 22:133-138.
  48. Stinson, D. R. (2001). Something about all or nothing (transforms). Designs, Codes and Cryptography, 22:133-138.
  49. Wang, Y. and Desmedt, Y. (2008). Perfectly secure message transmission revisited. IEEE Transactions on Information Theory, 54(6):2582-2595.
  50. Wang, Y. and Desmedt, Y. (2008). Perfectly secure message transmission revisited. IEEE Transactions on Information Theory, 54(6):2582-2595.
Download


Paper Citation


in Harvard Style

Rass S. and Schartner P. (2011). INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 134-143. DOI: 10.5220/0003516401340143


in Harvard Style

Rass S. and Schartner P. (2011). INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 134-143. DOI: 10.5220/0003516401340143


in Bibtex Style

@conference{secrypt11,
author={Stefan Rass and Peter Schartner},
title={INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={134-143},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003516401340143},
isbn={978-989-8425-71-3},
}


in Bibtex Style

@conference{secrypt11,
author={Stefan Rass and Peter Schartner},
title={INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={134-143},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003516401340143},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS
SN - 978-989-8425-71-3
AU - Rass S.
AU - Schartner P.
PY - 2011
SP - 134
EP - 143
DO - 10.5220/0003516401340143


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS
SN - 978-989-8425-71-3
AU - Rass S.
AU - Schartner P.
PY - 2011
SP - 134
EP - 143
DO - 10.5220/0003516401340143