Perfect security

from Wikipedia, the free encyclopedia

Perfect security or perfect secrecy is a term coined by Claude Shannon from information theory and cryptology . A perfectly secure encryption method is characterized in that a generated with him ciphertext (also referred to as a secret text or cipher text) no conclusions about the corresponding plaintext permits. With such a method, it is mathematically proven that an attacker who knows the ciphertext cannot gain any further information about it apart from the length of the plaintext. He cannot decipher the key text or even break the entire procedure .

definition

We need the components of an encryption process: Let be the set of all possible plaintexts, the set of keys and the set of all possible ciphers. These sets each have a finite number of elements. In addition, assume an encryption function and the corresponding decryption function.

As a rule, plain texts do not occur with the same probability . This depends, for example, on the language used or a protocol that the conversation follows. denote the probability with which a plaintext occurs.

An encryption method is called perfectly secure if the occurrence of a certain plain text is stochastically independent of the fact that a certain cipher is present. The equation therefore applies to all plaintexts and every cipher .

If an attacker intercepts a ciphertext , it is not possible for him to evaluate statistical abnormalities of the plaintext space. If he tries to guess the corresponding plain text, he is only correct with the probability that he would also achieve if he did not know the intercepted key text and blindly guessed a plain text.

Shannon's theorem

In 1949 Shannon proved the following theorem, which explains the conditions under which an encryption method is perfectly secure.

Be and for all was . The encryption method is perfectly safe , if and only if the probability distribution on the key space the uniform distribution , and if for each plaintext and ciphertext each key exactly there, so .

practice

From Shannon's theorem it follows that with perfectly secure methods the probability distribution on the key space must be the uniform distribution. Statistical deviations can lead to the system becoming insecure. Therefore, cryptographically secure random number generators should be used to generate keys .

Shannon was able to show that perfectly secure encryption methods actually exist. One example of this is the one-time pad . Using such perfectly safe procedures is usually cumbersome in practice. They are therefore rarely used in real-time applications such as the Internet.

literature