Skip to main content

Showing 1–7 of 7 results for author: de Valroger, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:1805.00337  [pdf

    cs.CR

    Towards Practical Implementation of Deep Random Secrecy

    Authors: Thibault de Valroger

    Abstract: We have formerly introduced Deep Random Secrecy, a new cryptologic technique capable to ensure secrecy as close as desired from perfection against unlimited passive eavesdropping opponents. We have also formerly introduced an extended protocol, based on Deep Random Secrecy, capable to resist to unlimited active MITM. The main limitation of those protocols, in their initial presented version, is th… ▽ More

    Submitted 6 January, 2019; v1 submitted 28 April, 2018; originally announced May 2018.

    Comments: 21 pages and 9 pages of Annex. V3: Addition of a second optimization technique. Presentation of new and updated simulation results. arXiv admin note: text overlap with arXiv:1801.01456 and arXiv:1507.08258

  2. arXiv:1801.01456  [pdf

    cs.CR

    Deep Random based Key Exchange protocol resisting unlimited MITM

    Authors: Thibault de Valroger

    Abstract: We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The resistance to unlimited MITM is obtained through the combined use of Deep Random secrecy, formerly introduced and proved as unconditionally secur… ▽ More

    Submitted 30 September, 2018; v1 submitted 3 January, 2018; originally announced January 2018.

    Comments: 14 pages. V2: Updated reminder in the formalism of Deep Random assumption. arXiv admin note: text overlap with arXiv:1611.01683, arXiv:1507.08258

  3. arXiv:1712.09333  [pdf

    cs.CR

    Practical Implementation of a Deep Random Generator

    Authors: Thibault de Valroger

    Abstract: We have introduced in former work the concept of Deep Randomness and its interest to design Unconditionally Secure communication protocols. We have in particular given an example of such protocol and introduced how to design a Deep Random Generator associated to that protocol. Deep Randomness is a form of randomness in which, at each draw of random variable, not only the result is unpredictable bu… ▽ More

    Submitted 6 January, 2019; v1 submitted 22 December, 2017; originally announced December 2017.

    Comments: 28 pages, 3 pages of Annex. V3: Addition of a more precise and more efficient method to generate recursively each new distribution in the Deep Random Generator. Addition of an Annex with an impossibility result. arXiv admin note: substantial text overlap with arXiv:1507.08258

  4. arXiv:1709.01550  [pdf

    cs.IT

    A relation between conditional entropy and conditional expectation to evaluate secrecy systems

    Authors: Thibault de Valroger

    Abstract: We demonstrate an intuitive relation between conditional entropy and conditional expectation that is useful when one want to compare them as measurement tools to evaluate secrecy systems. In particular, we give a Security Property applicable to general n-dimensional vector variables, using measurement based on vector quadratic distance, and we show that one can derive variables that can be measure… ▽ More

    Submitted 11 October, 2017; v1 submitted 5 September, 2017; originally announced September 2017.

    Comments: 5 pages

  5. arXiv:1611.01683  [pdf

    cs.CR

    Simulations for Deep Random Secrecy Protocol

    Authors: Thibault de Valroger

    Abstract: We present numerical simulations measuring secrecy and efficiency rate of Perfect Secrecy protocol presented in former article named Perfect Secrecy under Deep Random assumption. Those simulations specifically measure the respective error rates of both legitimate partner and eavesdropper experimented during the exchange of a data flow through the protocol. Those measured error rates also enable us… ▽ More

    Submitted 30 September, 2018; v1 submitted 5 November, 2016; originally announced November 2016.

    Comments: 18 pages. V2: simulations corresponding to an updated protocol has been performed and complemented. Simulated effect of Privacy Amplification is also added. V3: a simulation with a flawed error correcting method is removed. V4: Updated reminder in the formalism of Deep Random assumption. arXiv admin note: substantial text overlap with arXiv:1507.08258; text overlap with arXiv:1605.04576

  6. arXiv:1605.04576  [pdf

    cs.IT cs.CR

    Why is Deep Random suitable for cryptology

    Authors: Thibault de Valroger

    Abstract: We present a new form of randomness, called Deep Randomness, generated in such a way that probability distribution of the output signal is made unknowledgeable for an observer. By limiting, thanks to Deep Randomness, the capacity of the opponent observer to perform bayesian inference over public information to estimate private information, we can design protocols, beyond Shannon limit, enabling tw… ▽ More

    Submitted 23 May, 2017; v1 submitted 15 May, 2016; originally announced May 2016.

    Comments: 10 pages. arXiv admin note: substantial text overlap with arXiv:1507.08258

  7. arXiv:1507.08258  [pdf

    cs.CR

    Perfect Secrecy under Deep Random assumption

    Authors: Thibault de Valroger

    Abstract: We present a new idea to design perfectly secure information exchange protocol, based on so called Deep Randomness, which means randomness relying on hidden probability distribution. Such idea drives us to introduce a new axiom in probability theory, thanks to which we can design a protocol, beyond Shannon limit, enabling two legitimate partners, sharing originally no common private information, t… ▽ More

    Submitted 6 January, 2019; v1 submitted 29 July, 2015; originally announced July 2015.

    Comments: 30 pages main and 48 pages annex. V12: A more accurate proof of Theorem 1 is given, where Advantage Distillation is proved without the use of Maurer error correcting technique. Addition of a more precise and more efficient method to generate recursively each new distribution in the Deep Random Generator described in section 4