2019
DOI: 10.3390/e21070701
|View full text |Cite
|
Sign up to set email alerts
|

A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security

Abstract: An approach for security enhancement of a class of encryption schemes is pointed out and its security is analyzed. The approach is based on certain results of coding and information theory regarding communication channels with erasures and deletion errors. In the security enhanced encryption scheme, the wiretapper faces a problem of cryptanalysis after a communication channel with bits deletion and a legitimate party faces a problem of decryption after a channel with bit erasures. This paper proposes the encry… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…One of the encryption approaches is based on the use of a cryptographic key to control error correction coding algorithms, and it is reported, for example, in [4][5][6][7][8][9][10][11][12][13][14][15]. The other approach is the use of error correction coding and noisy channels for the cryptographic security enhancement of a given encryption scheme: this approach has been reported, for example, in [1,[16][17][18][19][20][21][22][23][24]. These security enhancements are based on paradigms of the additive noisy channel or channels with synchronization errors.…”
Section: Related Work and Background On The Security-enhanced Encrypt...mentioning
confidence: 99%
See 4 more Smart Citations
“…One of the encryption approaches is based on the use of a cryptographic key to control error correction coding algorithms, and it is reported, for example, in [4][5][6][7][8][9][10][11][12][13][14][15]. The other approach is the use of error correction coding and noisy channels for the cryptographic security enhancement of a given encryption scheme: this approach has been reported, for example, in [1,[16][17][18][19][20][21][22][23][24]. These security enhancements are based on paradigms of the additive noisy channel or channels with synchronization errors.…”
Section: Related Work and Background On The Security-enhanced Encrypt...mentioning
confidence: 99%
“…In the following, we discuss the following two paradigms for the security enhancement: (i) encode → encrypt → degrade paradigm employed for stream ciphers enhancement in [17,19,21,23,24]; (ii) encrypt → encode → degrade paradigm reported in [1,18,20,22].…”
Section: Related Work and Background On The Security-enhanced Encrypt...mentioning
confidence: 99%
See 3 more Smart Citations