Cryptology ePrint Archive: Report 2021/496

Applications of SKREM-like symmetric key ciphers

Mircea Digulescu

Abstract: In a prior paper we introduced a new symmetric key encryption scheme called Short Key Random Encryption Machine (SKREM), for which we claimed excellent security guarantees. In this paper we present and briefly discuss some of its applications outside conventional data encryption. These are Secure Coin Flipping, Cryptographic Hashing, Zero-Leaked-Knowledge Authentication and Authorization and a Digital Signature scheme which can be employed on a block-chain. We also briefly recap SKREM-like ciphers and the assumptions on which their security are based. The above applications are novel because they do not involve public key cryptography. Furthermore, the security of SKREM-like ciphers is not based on hardness of some algebraic operations, thus not opening them up to specific quantum computing attacks.

Category / Keywords: cryptographic protocols / Symmetric Key Encryption, Provable Security, One Time Pad, Zero Knowledge, Cryptographic Commit Protocol, Secure Coin Flipping, Authentication, Authorization, Cryptographic Hash, Digital Signature, Chaos Machine

Date: received 17 Apr 2021

Contact author: mircea digulescu at mail ru

Available format(s): PDF | BibTeX Citation

Note: Licensed under CC BY-NC (creative commons attribution-noncommercial) license.

Version: 20210419:061030 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]