Cryptology ePrint Archive: Report 2000/011

Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext

Gideon Samid

Abstract: Abstract. The prevailing cryptographies are attacked on the basis of the fact that only a single element in the key space will match a plausible plaintext with a given ciphertext. Any cryptography that would violate this unique-key assumption, will achieve added security through deniability (akin to One Time Pad). Such cryptography is being described. It is achieved by breaking away from the prevailing notion that the key is a binary string of a fixed length. The described key is random-size non-linear array: a graph constructed from vertices and edges. The binary naming of the vertices and edges, and the configuration are all part of the key. Such keys can take-on most of the necessary complexity, which allows the algorithm itself to be exceedingly simple (a-la Turing Machine).

Category / Keywords: foundations / deniability, random-size key, topological cipher

Date: received 21 Apr 2000

Contact author: gideon at dgsciences com

Available format(s): PDF | BibTeX Citation

Version: 20000421:184503 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]