Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain-Texts

  • Masayoshi Hayashi
  • Hiroaki HigakiEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 969)


One of the fundamental methods for eavesdroppers to achieve a plaintext from a cryptogram is the brute force attack where possible candidates of decryption keys are exhaustively applied to the decryption algorithm. Here the only reason why the eavesdroppers believe to find the common-key and to achieve the plaintext is that the output of the decryption algorithm is contextually acceptable. According to this fact, this paper proposes a novel common-key cryptosystem where fake plaintexts which are also contextually acceptable are mixed into a cryptogram with the legal plaintext. If an eavesdropper applies a fake common-key to the decryption algorithm, it outputs the fake plaintexts which the eavesdroppers might believe legal. This paper also proposes concrete encryption/decryption algorithm which can be combined with any conventional common-key cryptosystem. Results of simulation experiments show the proposed method reduces probability for eavesdroppers to get legal plaintexts.


Common key cryptosystem Fake plaintexts Brute force attack 


  1. 1.
    Daemen, J., RijnMen, V.: The rijndael block cipher, AES proposal. In: First AES Candidate Conference (AES1) (1998)Google Scholar
  2. 2.
    Shannon, C.E.: Communication theory of secrecy systems. In: IEEE Press, pp. 84–143 (1949)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Robotics and MechatronicsTokyo Denki UniversityTokyoJapan

Personalised recommendations