Protocols for symmetric secret key establishment: Modern approach

Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems. Defining and implementing efficient protocols for symmetric cryptographic keys est...

Full description

Bibliographic Details
Main Authors: Meiran Galis, Tomislav B. Unkašević, Zoran Đ. Banjac, Milan M. Milosavljević
Format: Article
Language:English
Published: University of Defence in Belgrade 2022-07-01
Series:Vojnotehnički Glasnik
Subjects:
Online Access:https://scindeks.ceon.rs/article.aspx?artid=0042-84692203604G
_version_ 1818255374465105920
author Meiran Galis
Tomislav B. Unkašević
Zoran Đ. Banjac
Milan M. Milosavljević
author_facet Meiran Galis
Tomislav B. Unkašević
Zoran Đ. Banjac
Milan M. Milosavljević
author_sort Meiran Galis
collection DOAJ
description Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems. Defining and implementing efficient protocols for symmetric cryptographic keys establishment in such circumstances is of great importance in raising information security in cyberspace. Methods: Using the methods of Information Theory and Secure Multiparty Computation, protocols for direct establishment of cryptographic keys between communication parties have been defined. Results: The paper defines two new approaches to the problem of establishing cryptographic keys. The novelty in the protocol defined in the security model based on information theory is based on the source of common randomness, which in this case is the EEG signal of each subject participating in the communication system. Experimental results show that the amount of information leaking to the attacker is close to zero. A novelty in the second case, which provides security with keys at the level of computer security by applying Secure Multiparty Computation, is in the new application field, namely generation and distribution of symmetric cryptographic keys. It is characteristic of both approaches that within the framework of formal theories, it is possible to draw conclusions about their security characteristics in a formal way. Conclusions: The paper describes two new approaches for establishing cryptographic keys in symmetric cryptographic systems with experimental results. The significance of the proposed solutions lies in the fact that they enable the establishment of secure communication between comunication parties from end to end, avoiding the influence of a trusted third party. In that way, the achieved communication level security significantly increases in relation to classical cryptographic systems.
first_indexed 2024-12-12T17:10:51Z
format Article
id doaj.art-be77a7facab0444abe72fd793604275a
institution Directory Open Access Journal
issn 0042-8469
2217-4753
language English
last_indexed 2024-12-12T17:10:51Z
publishDate 2022-07-01
publisher University of Defence in Belgrade
record_format Article
series Vojnotehnički Glasnik
spelling doaj.art-be77a7facab0444abe72fd793604275a2022-12-22T00:17:53ZengUniversity of Defence in BelgradeVojnotehnički Glasnik0042-84692217-47532022-07-0170360463510.5937/vojtehg70-36607Protocols for symmetric secret key establishment: Modern approachMeiran Galis0https://orcid.org/0000-0003-3017-9542Tomislav B. Unkašević1https://orcid.org/0000-0002-6456-9250Zoran Đ. Banjac2https://orcid.org/0000-0001-8195-8576Milan M. Milosavljević3https://orcid.org/0000-0001-9630-804XInstitute VLATACOM, Belgrade, Republic of Serbia; Scytale, Tel Aviv, State of IsraelInstitute VLATACOM, Belgrade, Republic of SerbiaInstitute VLATACOM, Belgrade, Republic of SerbiaSingidunum University, Belgrade, Republic of SerbiaIntroduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems. Defining and implementing efficient protocols for symmetric cryptographic keys establishment in such circumstances is of great importance in raising information security in cyberspace. Methods: Using the methods of Information Theory and Secure Multiparty Computation, protocols for direct establishment of cryptographic keys between communication parties have been defined. Results: The paper defines two new approaches to the problem of establishing cryptographic keys. The novelty in the protocol defined in the security model based on information theory is based on the source of common randomness, which in this case is the EEG signal of each subject participating in the communication system. Experimental results show that the amount of information leaking to the attacker is close to zero. A novelty in the second case, which provides security with keys at the level of computer security by applying Secure Multiparty Computation, is in the new application field, namely generation and distribution of symmetric cryptographic keys. It is characteristic of both approaches that within the framework of formal theories, it is possible to draw conclusions about their security characteristics in a formal way. Conclusions: The paper describes two new approaches for establishing cryptographic keys in symmetric cryptographic systems with experimental results. The significance of the proposed solutions lies in the fact that they enable the establishment of secure communication between comunication parties from end to end, avoiding the influence of a trusted third party. In that way, the achieved communication level security significantly increases in relation to classical cryptographic systems. https://scindeks.ceon.rs/article.aspx?artid=0042-84692203604Gsymmetric cryptographic keykey establishmentsource of randomnessadvantage distillationinformation reconciliationprivacy amplificationsecure multiparty computation
spellingShingle Meiran Galis
Tomislav B. Unkašević
Zoran Đ. Banjac
Milan M. Milosavljević
Protocols for symmetric secret key establishment: Modern approach
Vojnotehnički Glasnik
symmetric cryptographic key
key establishment
source of randomness
advantage distillation
information reconciliation
privacy amplification
secure multiparty computation
title Protocols for symmetric secret key establishment: Modern approach
title_full Protocols for symmetric secret key establishment: Modern approach
title_fullStr Protocols for symmetric secret key establishment: Modern approach
title_full_unstemmed Protocols for symmetric secret key establishment: Modern approach
title_short Protocols for symmetric secret key establishment: Modern approach
title_sort protocols for symmetric secret key establishment modern approach
topic symmetric cryptographic key
key establishment
source of randomness
advantage distillation
information reconciliation
privacy amplification
secure multiparty computation
url https://scindeks.ceon.rs/article.aspx?artid=0042-84692203604G
work_keys_str_mv AT meirangalis protocolsforsymmetricsecretkeyestablishmentmodernapproach
AT tomislavbunkasevic protocolsforsymmetricsecretkeyestablishmentmodernapproach
AT zoranđbanjac protocolsforsymmetricsecretkeyestablishmentmodernapproach
AT milanmmilosavljevic protocolsforsymmetricsecretkeyestablishmentmodernapproach