A Provably-Secure Strongly-Randomized Cipher

  • Ueli M. Maurer
Conference paper

DOI: 10.1007/3-540-46877-3_33

Part of the Lecture Notes in Computer Science book series (LNCS, volume 473)
Cite this paper as:
Maurer U.M. (1991) A Provably-Secure Strongly-Randomized Cipher. In: Damgård I.B. (eds) Advances in Cryptology — EUROCRYPT ’90. EUROCRYPT 1990. Lecture Notes in Computer Science, vol 473. Springer, Berlin, Heidelberg


Shannon’s pessimistic theorem, which states that a cipher can be perfect only when the entropy of the secret key is at least as great as that of the plaintext, is relativized by the demonstration of a randomized cipher in which the secret key is short but the plaintext can be very long. This cipher is shown to be “perfect with high probability”. More precisely, the enemy is unable to obtain any information about the plaintext when a certain security event occurs, and the probability of this event is shown to be arbitrarily close to one unless the enemy performs an infeasible computation. This cipher exploits the existence of a publicly-accessible string of random bits whose length is much greater than that of all the plaintext to be encrypted before the secret key and the randomizer itself are changed. Two modifications of this cipher are discussed that may lead to practical provably-secure ciphers based on either of two assumptions that appear to be novel in cryptography, viz., the (sole) assumption that the enemy’s memory capacity (but not his computing power) is restricted and the assumption that an explicit function is, in a specified sense, controllably-difficult to compute, but not necessarily one-way.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 1991

Authors and Affiliations

  • Ueli M. Maurer
    • 1
  1. 1.Institute for Signal and Information ProcessingSwiss Federal Institute of TechnologyZurich

Personalised recommendations