Stream Pseudo-probabilistic Ciphers

  • Nikolay Andreevich Moldovyan
  • Dmitriy Nikolaevich Moldovyan
  • Quang Minh Le
  • Long Giang Nguyen
  • Sy Tan Ho
  • Hieu Minh Nguyen
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 266)


The paper considers methods and algorithms for stream pseudo-probabilistic encryption and introduces a novel design of such ciphers. In the known algorithms of such type two independent messages (fake and secret ones) are encrypted simultaneously (with using two different keys, fake and secret) and the produced ciphertext is computationally indistinguishable from the ciphertext produced by process of the probabilistic encryption of the fake message using the fake key. However in the known stream pseudo-probabilistic encryption schemes the algorithms for decrypting the fake and secret messages do not coincide completely. Therefore a potential attacker can use the last fact to distinguish the pseudo-probabilistic encryption from the probabilistic one. To provide resistance to such potential attacks in the paper there are proposed stream pseudo-probabilistic ciphers satisfying criterion of the sameness of the algorithms for decrypting the fake and secret messages. The introduced ciphers are sufficiently fast and represent interest for practical application to provide confidentiality of the communication protocols performed using public channels. The randomized pseudo-probabilistic stream ciphers have been also designed.


Stream cipher Pseudo-probabilistic encryption Probabilistic cipher Fake message Secret message 



The reported study was funded by Russian Foundation for Basic Research (project \(\#18-57-54002-Viet\_a\)) and by Vietnam Academy of Science and Technology (project \(\#QTRU01.08/18-19\)).


  1. 1.
    Moldovyan, N.A., Nashwan, A.A.-M., Nguyen, D.T., Nguyen, N.H., Nguyen, H.M.: Deniability of symmetric encryption based on computational indistinguishability from probabilistic ciphering. In: Bhateja, V., Nguyen, B.L., Nguyen, N.G., Satapathy, S.C., Le, D.-N. (eds.) Information Systems Design and Intelligent Applications. AISC, vol. 672, pp. 209–218. Springer, Singapore (2018). Scholar
  2. 2.
    Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90–104. Springer, Heidelberg (1997). Scholar
  3. 3.
    Barakat, M.T.: A new sender-side public-key deniable encryption scheme with fast decryption. KSII Trans. Internet Inf. Syst. 8(9), 3231–3249 (2014)Google Scholar
  4. 4.
    Dachman-Soled, D.: On minimal assumptions for sender-deniable public key encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 574–591. Springer, Heidelberg (2014). Scholar
  5. 5.
    Ishai, Y., Kushilevitz, E., Ostrovsky, R., Prabhakaran, M., Sahai, A.: Efficient non-interactive secure computation. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 406–425. Springer, Heidelberg (2011). Scholar
  6. 6.
    Moldovyan, N.A., Moldovyan, A.A., Tam, N.D., Hai, N.N., Minh, N.H.: Pseudo-probabilistic block ciphers and their randomization. J. Ambient Intell. Hum. Comput. (2018).
  7. 7.
    Moldovyan, N.A., Moldovyan, A.A., Moldovyan, D.N., Shcherbacov, V.A.: Stream deniable-encryption algorithms. Comput. Sci. J. Moldova 24(1), 68–82 (2017)MathSciNetzbMATHGoogle Scholar
  8. 8.
    Moldovyan, A.A., Moldovyan, N.A., Berezin, A.N., Shapovalov, P.I.: Randomized pseudo-probabilistic encryption algorithms. In: Proceedings of 2017 20th IEEE International Conference on Soft Computing and Measurements, SCM 2017, pp. 14–17 (2017)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • Nikolay Andreevich Moldovyan
    • 1
  • Dmitriy Nikolaevich Moldovyan
    • 1
  • Quang Minh Le
    • 2
  • Long Giang Nguyen
    • 3
  • Sy Tan Ho
    • 4
  • Hieu Minh Nguyen
    • 4
  1. 1.St. Petersburg Institute for Informatics and Automation of Russian Academy of SciencesSt. PetersburgRussia
  2. 2.The Information Technology Institute (ITI)Vietnam National UniversityHanoiVietnam
  3. 3.Institute of Information TechnologyVietnam Academy of Science and TechnologyHanoiVietnam
  4. 4.Academy of Cryptography TechniquesHanoiVietnam

Personalised recommendations