Common-Key Cryptosystem with Mixture of Fake Plaintexts
Masayoshi Hayashi, Hiroaki Higaki
Available Online February 2018.
- https://doi.org/10.2991/csece-18.2018.22How to use a DOI?
- cryptography; common key cryptosystem; fake plaintexts; brute force attack
- One of the fundamental methods for eavesdroppers to achieve a plaintext from a cryptogram is the brute force attack where possible candidates of decryption keys are exhaustively applied to the decryption algorithm. Here the only reason why the eavesdroppers believe to find the common-key and to achieve the plaintext is that the output of the decryption algorithm is contextually acceptable. According to this fact, this paper proposes a novel common-key cryptosystem where fake plaintexts which are also contextually acceptable are mixed into a cryptogram with the legal plaintext. If an eavesdropper applies a fake common-key to the decryption algorithm, it outputs the fake plaintexts which the eavesdroppers might believe legal. This paper also proposes concrete encryption/decryption algorithm which can be combined with any conventional common-key cryptosystem.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Masayoshi Hayashi AU - Hiroaki Higaki PY - 2018/02 DA - 2018/02 TI - Common-Key Cryptosystem with Mixture of Fake Plaintexts BT - 2018 International Conference on Computer Science, Electronics and Communication Engineering (CSECE 2018) PB - Atlantis Press SN - 2352-538X UR - https://doi.org/10.2991/csece-18.2018.22 DO - https://doi.org/10.2991/csece-18.2018.22 ID - Hayashi2018/02 ER -