**FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm **

*Gideon Samid*

**Abstract: **In the current crypto paradigm a single secret key transforms a plaintext into a ciphertext and vice versa, or at most a different key is doing the reverse action. Attackers exposed to the ciphertext are hammering it to extract that single key and the plaintext. This paradigm may be challenged with an alternate setup: using a particular crypto algorithm, there is an infinite number of keys that are perfectly interchangeable -- each has the same effect. Nonetheless they are hard to find. And unlike regular cryptography, the best an attacker can hope for using this new "Family Key Cryptography”, is to identify the entire infinitely large family of keys, not the actual key that executed the cryptographic action. This very fact is a cornerstone for a host of applications, mostly still to be unfolded. E.g.: (1) Community Cryptography, where each member has a different key, but the community will encrypt and decrypt as if sharing the same key; (2) 'Forever Key Cryptography': crashing the Shannon's limit, the Forever Key strategy will allow a single finite key to last indefinitely. The shared secret key will be used to derive a succession of operating keys, which will be replaced before they are being compromised. Since any cryptanalysis of usage will end up with an infinite list of key candidates, there will be equal number of candidates for the shared "Forever Key", and thus there will be no erosion in the secrecy of the Forever Key regardless of its level of use. The very idea of infinite number of interchangeable keys is so fundamentally different, that most of its applications are still unknown.

**Category / Keywords: **secret-key cryptography / paradigm, Vernam, Shannon, Mathematical Secrecy

**Date: **received 7 Apr 2021

**Contact author: **gideon samid at CASE edu

**Available format(s): **PDF | BibTeX Citation

**Note: **The "Forever Key" cryptography described herein, is now being evaluated for 'drop-and-forget' climate sensors in hard to reach locations, and where it is important to ascertain the authenticity of the climate recordings.

**Version: **20210408:122940 (All versions of this report)

**Short URL: **ia.cr/2021/458

[ Cryptology ePrint archive ]