Hyper-encryption is a form of
encryption
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can dec ...
invented by
Michael O. Rabin
Michael Oser Rabin ( he, מִיכָאֵל עוזר רַבִּין; born September 1, 1931) is an Israeli mathematician and computer scientist and a recipient of the Turing Award.
Biography Early life and education
Rabin was born in 1931 in ...
which uses a high-bandwidth source of public
random
In common usage, randomness is the apparent or actual lack of pattern or predictability in events. A random sequence of events, symbols or steps often has no order and does not follow an intelligible pattern or combination. Individual rando ...
bit
The bit is the most basic unit of information in computing and digital communications. The name is a portmanteau of binary digit. The bit represents a logical state with one of two possible values. These values are most commonly represented a ...
s, together with a
secret key that is shared by only the sender and recipient(s) of the message. It uses the assumptions of
Ueli Maurer's
bounded-storage model as the basis of its secrecy. Although everyone can see the data, decryption by adversaries without the secret key is still not feasible, because of the space limitations of storing enough data to mount an attack against the system.
Unlike almost all other cryptosystems except the
one-time pad
In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is not smaller than the message being sent. In this technique, a plaintext is paired with a r ...
, hyper-encryption can be proved to be
information-theoretically secure
A cryptosystem is considered to have information-theoretic security (also called unconditional security) if the system is secure against adversaries with unlimited computing resources and time. In contrast, a system which depends on the computatio ...
, provided the storage bound cannot be surpassed. Moreover, if the necessary public information cannot be stored at the time of transmission, the plaintext can be shown to be impossible to recover, regardless of the computational capacity available to an adversary in the future, even if they have access to the secret key at that future time.
A highly energy-efficient implementation of a hyper-encryption chip was demonstrated by
Krishna Palem et al. using the Probabilistic CMOS or
PCMOS technology and was shown to be ~205 times more efficient in terms of Energy-Performance-Product.
See also
*
Perfect forward secrecy
In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key agreement protocols that gives assurances that session keys will not be compromised even if long-term secrets used in the session key e ...
*
Randomness extractor A randomness extractor, often simply called an "extractor", is a function, which being applied to output from a weakly random entropy source, together with a short, uniformly random seed, generates a highly random output that appears independent fro ...
References
Further reading
* Y. Z. Ding and M. O. Rabin. ''Hyper-encryption and everlasting security.'' In 19th Annual Symposium on Theoretical Aspects of Computer Science (STACS), volume 2285 of ''Lecture Notes in Computer Science'', pp. 1–26. Springer-Verlag, 2002.
* Jason K. Juang
Practical Implementation and Analysis of Hyper-Encryption. Masters dissertation, MIT Department of Electrical Engineering and Computer Science, 2009-05-22.
External links
*
*
video of a lecture by Professor
Michael O. Rabin
Michael Oser Rabin ( he, מִיכָאֵל עוזר רַבִּין; born September 1, 1931) is an Israeli mathematician and computer scientist and a recipient of the Turing Award.
Biography Early life and education
Rabin was born in 1931 in ...
.
Cryptography
Information theory
{{Crypto-stub