Cryptology ePrint Archive: Report 2020/1539

Information-Theoretic Security of Cryptographic Channels

Marc Fischlin and Felix GŁnther and Philipp Muth

Abstract: We discuss the setting of information-theoretically secure channel protocols where confidentiality of transmitted data should hold against unbounded adversaries. We argue that there are two possible scenarios: One is that the adversary is currently bounded, but stores today's communication and tries to break confidentiality later when obtaining more computational power or time. We call channel protocols protecting against such attacks future-secure. The other scenario is that the adversary already has extremely strong computational powers and may try to use that power to break current executions. We call channels withstanding such stronger attacks unconditionally-secure.

We discuss how to instantiate both future-secure and unconditionally-secure channels. To this end we first establish according confidentiality and integrity notions, then prove the well-known composition theorem to also hold in the information-theoretic setting: Chosen-plaintext security of the channel protocol, together with ciphertext integrity, implies the stronger chosen-ciphertext notion. We discuss how to build future-secure channel protocols by combining computational message authentication schemes like HMAC with one-time pad encryption. Chosen-ciphertext security follows easily from the generalized composition theorem. We also show that using one-time pad encryption with the unconditionally-secure Carter-Wegman MACs we obtain an unconditionally-secure channel protocol.

Category / Keywords: cryptographic protocols / channel protocol, information-theoretic security, integrity, confidentiality

Original Publication (with minor differences): 22nd International Conference on Information and Communications Security (ICICS 2020)
DOI:
10.1007/978-3-030-61078-4_17

Date: received 10 Dec 2020

Contact author: marc fischlin at cryptoplexity de, mail@felixguenther info, muth@seceng informatik tu-darmstadt de

Available format(s): PDF | BibTeX Citation

Version: 20201213:163803 (All versions of this report)

Short URL: ia.cr/2020/1539


[ Cryptology ePrint archive ]