Description
This paper proposes a new model for secure communication channels between two parties. The new model assumes that adversaries are storage space bounded, but not computationally bounded. At the initial phase of the secret communication, both parties exchange a large amount of random bits so that adversaries are not able to save them due to the storage space limitation. Each party only saves received data. At the second phase, each party regenerates the random bits, combines with received data, and generates an encryption key iteratively with a one-way hash function. The key is, then, used to encrypt the first transmission from one party to the other. After each transmission, the key is updated iteratively based on data received. The relationships between the model and intelligent systems are discussed.
Date of creation, presentation, or exhibit
4-2006
Document Type
Conference Paper
Department, Program, or Center
Department of Computing Security (GCCIS)
Recommended Citation
B. Yuan, "An Asymptotic secrecy model and intelligent systems," 2006 International Conference on Intelligent Systems and Knowledge Engineering, Shanghai, 2006.
Campus
RIT – Main Campus
Comments
© 2006 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Note: imported from RIT’s Digital Media Library running on DSpace to RIT Scholar Works in February 2014.