Abstract
We discuss several applications of information theory in cryptography, both for unconditional and for computational security. Unconditionally-secure secrecy, authentication, and key agreement are reviewed. It is argued that unconditional security can practically be achieved by exploiting the fact that cryptography takes place in a physical world in which, for instance due to noise, nobody can have complete information about the state of a system.
The general concept of an information-theoretic cryptographic primitive is proposed which covers many previously considered primitives like oblivious transfer, noisy channels, and multi-party computation. Many results in information-theoretic cryptography can be phrased as reductions among such primitives We also propose the concept of a generalized random oracle which answers more general queries than the evaluation of a random function. They have applications in proofs of the computational security of certain cryptographic schemes.
This extended abstract summarizes in an informal and non-technical way some of the material presented in the author’s lecture to be given at Crypto ’99.
Supported in part by the Swiss National Science Foundation, grant no. 20-42105.94.
Chapter PDF
Similar content being viewed by others
Key words
References
M. Bellare, J. Kilian, and P. Rogaway, The security of the cipher block chaining message authentication code, Advances in Cryptology-CRYPTO’ 94, Lecture Notes in Computer Science, vol. 839, Springer-Verlag, 1995.
M. Bellare, J. Guérin, and P. Rogaway, The security of the cipher block chaining message authentication code, Advances in Cryptology-CRYPTO’ 95, Lecture Notes in Computer Science, vol. 963, Springer-Verlag, 1994.
M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness theorems for noncryptographic fault-tolerant distributed computation, In Proc. 20th ACM Symposium on the Theory of Computing (STOC), pp. 1–10, 1988.
C.. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, Experimental quantum cryptography, Journal of Cryptology, vol. 5, no. 1, pp. 3–28, Springer-Verlag, 1992.
C.H. Bennett, G. Brassard, C. Crépeau, and U.M. Maurer, Generalized privacy amplification, IEEE Transactions on Information Theory, vol. 41, no. 6, pp. 1915–1923, 1995.
C.H. Bennett, G. Brassard, and J.-M. Robert, Privacy amplification by public discussion, SIAM Journal on Computing, vol. 17, pp. 210–229, 1988.
R. E. Blahut, Principles and practice of information theory, Addison-Wesley Publishing Company, 1988.
G. Brassard and C. Crépeau, Oblivious transfer and privacy amplification, Advances in Cryptology-EUROCRYPT’ 97, Lectures Notes in Computer Science, vol. 1233, pp. 334–345, Springer-Verlag, 1997.
C. Cachin, Entropy measures and unconditional security in cryptography, Ph. D. Thesis, ETH Zurich, Hartung-Gorre Verlag, Konstanz, 1997.
—, On the foundation of oblivious transfer, Advances in Cryptology-EURO-CRYPT’ 98, Lecture Notes in Computer Science, vol. 1403, pp. 361–374, Springer-Verlag, 1998.
C. Cachin and U.M. Maurer, Unconditional security against memory-bounded adversaries, Advances in Cryptology-CRYPTO’ 97, Lectures Notes in Computer Science, vol. 1294, pp. 292–306, Springer-Verlag, 1997.
D. Chaum, C. Crépeau, and I. Damgård, Multiparty unconditionally secure protocols, In Proc. 20th ACM Symposium on the Theory of Computing (STOC), pages 11–19, 1988.
T. M. Cover and J.A. Thomas, Elements of information theory, Wiley Series in Telecommunications, 1992.
C. Crépeau, Equivalence between two flavours of oblivious transfer, Advances in Cryptology-CRYPTO’ 87, Lecture Notes in Computer Science, pp. 350–354, Springer-Verlag, 1988.
—, Efficient cryptographic protocols based on noisy channels, Advances in Cryptology-EUROCRYPT’ 97, Lectures Notes in Computer Science, vol. 1233, pp. 306–317, Springer-Verlag, 1997.
C. Crépeau and J. Kilian, Achieving oblivious transfer using weakened security assumptions, 29th Symposium on Foundations of Computer Science, pp. 42–52, IEEE, 1988.
I. Csiszár and J. Korner, Broadcast channels with confidential messages, IEEE Transactions on Information Theory, vol. IT-24, pp. 339–348, 1978.
I. Damgård, J. Kilian, and L. Salvail, On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions, Advances in Cryptology-EUROCRYPT’ 99, Lecture Notes in Computer Science, vol. 1592, pp. 56–73, Springer-Verlag, 1999.
W. Diffe and M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976.
Y. Dodis and S. Micali, Lower bounds for oblivious transfer reductions, Advances in Cryptology-EUROCRYPT’ 99, Lecture Notes in Computer Science, vol. 1592, pp. 42–55, Springer-Verlag, 1999.
W. Feller, An introduction to probability theory and its applications, 3rd edition, vol. 1, Wiley International, 1968.
M. J. Fischer and R. N. Wright, Bounds on secret key exchange using a random deal of cards, Journal of Cryptology, vol. 9, no. 2, pp. 71–99, Springer-Verlag, 1996.
P. Gemmell and M. Naor, Codes for interactive authentication, Advances in Cryptology-CRYPTO’ 93, Lecture Notes in Computer Science, vol. 773, pp. 355–367, Springer-Verlag, 1993.
E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, Codes which detect deception, Bell Syst. Tech. J., vol. 53, no. 3, 1974, pp. 405–424.
O. Goldreich, S. Goldwasser, and S. Micali, How to construct random functions, Journal of the ACM, vol. 33, no. 4, pp. 210–217, 1986.
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game — a completeness theorem for protocols with honest majority. In Proc. 19th ACM Symposium on the Theory of Computing (STOC), pp. 218–229, 1987.
J. Håstad, R. Impagliazzo, L. Levin, and M. Luby, Construction of a pseudorandom generator from any one-way function, Technical Report no. 91-068, ICSI, Berkeley, CA, 1991.
L. Lamport, R. Shostak, and M. Pease, The Byzantine generals problem, ACM Transactions on Programming Languages and Systems, vol. 4, pp. 382–401, 1982.
M. Luby and C. Rackoff, How to construct pseudorandom permutations from pseudorandom functions, SIAM Journal on Computing, vol. 17, no. 2, pp. 373–386, 1988.
U. M. Maurer, Conditionally-perfect secrecy and a provably-secure randomized cipher, Journal of Cryptology, vol. 5, pp. 53–66, Springer-Verlag, 1992.
—, A simplified and generalized treatment of Luby-Rackoff pseudo-random permutation generators, Advances in Cryptology-EUROCRYPT’ 92, Lecture Notes in Computer Science, vol. 658, pp. 239–255, Springer-Verlag, 1992.
—, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733–742, 1993.
—, A unified and generalized treatment of authentication theory, Proceedings 13th Symp. on Theoretical Aspects of Computer Science-STACS’ 96, Lecture Notes in Computer Science, vol. 1046, pp. 387–398, Springer-Verlag, 1996.
—, Information-theoretically secure secret-key agreement by NOT authenticated public discussion, Advances in Cryptology-EUROCRYPT’ 97, Lecture Notes in Computer Science, vol. 1233, pp. 209–225, Springer-Verlag, 1997.
U. M. Maurer and S. Wolf, Unconditionally secure key agreement and the intrinsic conditional information, IEEE Transactions on Information Theory, vol. 45, no. 2, pp. 499–514, 1999.
M. Naor and O. Reingold, On the construction of pseudorandom permutations: Luby-Rackoff revisited, Journal of Cryptology, vol. 12, no. 1, pp. 29–66, 1999.
M.O. Rabin, personal communication, 1998.
T. Rabin and M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority, Proc. 21st ACM Symposium on the Theory of Computing (STOC), pp. 73–85, 1989.
C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, vol. 28, pp. 656–715, 1949.
—, A mathematical theory of communication, Bell System Technical Journal, vol. 27, pp. 379–423 and 623—656, 1948.
G. J. Simmons, A survey of information authentication, Proceedings of the IEEE, vol. 76, pp. 603–620, 1988.
D. R. Stinson, Universal hashing and authentication codes, Advances in Cryptology-CRYPTO’ 91, Lecture Notes in Computer Science, vol. 576, pp. 74–85, Springer-Verlag, 1992.
G. S. Vernam, Cipher printing telegraph systems for secret wire and radio telegraphic communications, Journal of the American Institute for Electrical Engineers, vol. 55, pp. 109–115, 1926.
M. N. Wegman and J. L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, vol. 22, pp. 265–279, 1981.
S. Wolf, Strong security against active attacks in information-theoretic secret-key agreement, Advances in Cryptology-ASIACRYPT’ 98, Lecture Notes in Computer Science, vol. 1514, pp. 405–419, Springer-Verlag, 1998.
—, Unconditional security in cryptography, Proceedings of Summer School in Cryptology and Data Security, July 1998, Aarhus, Denmark, Lectures Notes in Computer Science, vol. 1561, pp. 217–250, Springer-Verlag, 1999.
—, Information-theoretically and unconditionally secure key agreement in cryptography, Ph.D. Thesis no. 13138, ETH Zurich, 1999.
A. D. Wyner, The wire-tap channel, Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maurer, U. (1999). Information-Theoretic Cryptography. In: Wiener, M. (eds) Advances in Cryptology — CRYPTO’ 99. CRYPTO 1999. Lecture Notes in Computer Science, vol 1666. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48405-1_4
Download citation
DOI: https://doi.org/10.1007/3-540-48405-1_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66347-8
Online ISBN: 978-3-540-48405-9
eBook Packages: Springer Book Archive