Paper 2013/184

The Vernam cipher is robust to small deviations from randomness

Boris Ryabko

Abstract

The Vernam cipher (or one-time pad) has played an important rule in cryptography because it is a perfect secrecy system. For example, if an English text (presented in binary system) X1X2... is enciphered according to the formula Zi=(Xi+Yi)mod2, where Y1Y2... is a key sequence generated by the Bernoulli source with equal probabilities of 0 and 1, anyone who knows Z1Z2... has no information about X1X2... without the knowledge of the key Y1Y2.... (The best strategy is to guess X1X2... not paying attention to Z1Z2....) But what should one say about secrecy of an analogous method where the key sequence Y1Y2... is generated by the Bernoulli source with a small bias, say, ? To the best of our knowledge, there are no theoretical estimates for the secrecy of such a system, as well as for the general case where (the plaintext) and key sequence are described by stationary ergodic processes. We consider the running-key ciphers where the plaintext and the key are generated by stationary ergodic sources and show how to estimate the secrecy of such systems. In particular, it is shown that, in a certain sense, the Vernam cipher is robust to small deviations from randomness.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
running-key cipherVernam cipherShannon entropyunconditional secrecy
Contact author(s)
boris @ ryabko net
History
2013-04-02: revised
2013-04-01: received
See all versions
Short URL
https://ia.cr/2013/184
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/184,
      author = {Boris Ryabko},
      title = {The Vernam cipher is  robust to small deviations from randomness},
      howpublished = {Cryptology {ePrint} Archive, Paper 2013/184},
      year = {2013},
      url = {https://eprint.iacr.org/2013/184}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.