Protocols for symmetric secret key establishment: Modern approach
Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems. Defining and implementing efficient protocols for symmetric cryptographic keys est...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Defence in Belgrade
2022-07-01
|
Series: | Vojnotehnički Glasnik |
Subjects: | |
Online Access: | https://scindeks.ceon.rs/article.aspx?artid=0042-84692203604G |
_version_ | 1818255374465105920 |
---|---|
author | Meiran Galis Tomislav B. Unkašević Zoran Đ. Banjac Milan M. Milosavljević |
author_facet | Meiran Galis Tomislav B. Unkašević Zoran Đ. Banjac Milan M. Milosavljević |
author_sort | Meiran Galis |
collection | DOAJ |
description | Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days
and is especially emphasized by the emergence of mass communication systems. Defining and implementing efficient protocols for symmetric cryptographic keys establishment in such circumstances is of great
importance in raising information security in cyberspace.
Methods: Using the methods of Information Theory and Secure Multiparty Computation, protocols for direct establishment of cryptographic
keys between communication parties have been defined.
Results: The paper defines two new approaches to the problem of establishing cryptographic keys. The novelty in the protocol defined in the security model based on information theory is based on the source of common randomness, which in this case is the EEG signal of each subject
participating in the communication system. Experimental results show
that the amount of information leaking to the attacker is close to zero. A novelty in the second case, which provides security with keys at the level
of computer security by applying Secure Multiparty Computation, is in
the new application field, namely generation and distribution of symmetric cryptographic keys. It is characteristic of both approaches that within
the framework of formal theories, it is possible to draw conclusions about
their security characteristics in a formal way.
Conclusions: The paper describes two new approaches for establishing
cryptographic keys in symmetric cryptographic systems with experimental results. The significance of the proposed solutions lies in the fact that
they enable the establishment of secure communication between comunication parties from end to end, avoiding the influence of a trusted third
party. In that way, the achieved communication level security significantly increases in relation to classical cryptographic systems.
|
first_indexed | 2024-12-12T17:10:51Z |
format | Article |
id | doaj.art-be77a7facab0444abe72fd793604275a |
institution | Directory Open Access Journal |
issn | 0042-8469 2217-4753 |
language | English |
last_indexed | 2024-12-12T17:10:51Z |
publishDate | 2022-07-01 |
publisher | University of Defence in Belgrade |
record_format | Article |
series | Vojnotehnički Glasnik |
spelling | doaj.art-be77a7facab0444abe72fd793604275a2022-12-22T00:17:53ZengUniversity of Defence in BelgradeVojnotehnički Glasnik0042-84692217-47532022-07-0170360463510.5937/vojtehg70-36607Protocols for symmetric secret key establishment: Modern approachMeiran Galis0https://orcid.org/0000-0003-3017-9542Tomislav B. Unkašević1https://orcid.org/0000-0002-6456-9250Zoran Đ. Banjac2https://orcid.org/0000-0001-8195-8576Milan M. Milosavljević3https://orcid.org/0000-0001-9630-804XInstitute VLATACOM, Belgrade, Republic of Serbia; Scytale, Tel Aviv, State of IsraelInstitute VLATACOM, Belgrade, Republic of SerbiaInstitute VLATACOM, Belgrade, Republic of SerbiaSingidunum University, Belgrade, Republic of SerbiaIntroduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems. Defining and implementing efficient protocols for symmetric cryptographic keys establishment in such circumstances is of great importance in raising information security in cyberspace. Methods: Using the methods of Information Theory and Secure Multiparty Computation, protocols for direct establishment of cryptographic keys between communication parties have been defined. Results: The paper defines two new approaches to the problem of establishing cryptographic keys. The novelty in the protocol defined in the security model based on information theory is based on the source of common randomness, which in this case is the EEG signal of each subject participating in the communication system. Experimental results show that the amount of information leaking to the attacker is close to zero. A novelty in the second case, which provides security with keys at the level of computer security by applying Secure Multiparty Computation, is in the new application field, namely generation and distribution of symmetric cryptographic keys. It is characteristic of both approaches that within the framework of formal theories, it is possible to draw conclusions about their security characteristics in a formal way. Conclusions: The paper describes two new approaches for establishing cryptographic keys in symmetric cryptographic systems with experimental results. The significance of the proposed solutions lies in the fact that they enable the establishment of secure communication between comunication parties from end to end, avoiding the influence of a trusted third party. In that way, the achieved communication level security significantly increases in relation to classical cryptographic systems. https://scindeks.ceon.rs/article.aspx?artid=0042-84692203604Gsymmetric cryptographic keykey establishmentsource of randomnessadvantage distillationinformation reconciliationprivacy amplificationsecure multiparty computation |
spellingShingle | Meiran Galis Tomislav B. Unkašević Zoran Đ. Banjac Milan M. Milosavljević Protocols for symmetric secret key establishment: Modern approach Vojnotehnički Glasnik symmetric cryptographic key key establishment source of randomness advantage distillation information reconciliation privacy amplification secure multiparty computation |
title | Protocols for symmetric secret key establishment: Modern approach |
title_full | Protocols for symmetric secret key establishment: Modern approach |
title_fullStr | Protocols for symmetric secret key establishment: Modern approach |
title_full_unstemmed | Protocols for symmetric secret key establishment: Modern approach |
title_short | Protocols for symmetric secret key establishment: Modern approach |
title_sort | protocols for symmetric secret key establishment modern approach |
topic | symmetric cryptographic key key establishment source of randomness advantage distillation information reconciliation privacy amplification secure multiparty computation |
url | https://scindeks.ceon.rs/article.aspx?artid=0042-84692203604G |
work_keys_str_mv | AT meirangalis protocolsforsymmetricsecretkeyestablishmentmodernapproach AT tomislavbunkasevic protocolsforsymmetricsecretkeyestablishmentmodernapproach AT zoranđbanjac protocolsforsymmetricsecretkeyestablishmentmodernapproach AT milanmmilosavljevic protocolsforsymmetricsecretkeyestablishmentmodernapproach |