Perfect Secrecy and the Unbreakable Cipher - Comments

In summary, the conversation discusses the concept of perfect secrecy and unbreakable ciphers, specifically focusing on Shannon's entropy model and the Vernam cipher. The Vernam cipher is the only provably secure encryption scheme, but it still has weaknesses in terms of message forgery. The conversation also touches on the importance of considering other aspects of security, such as immunity from message forgery.
  • #1
bapowell
Science Advisor
Insights Author
2,243
260
bapowell submitted a new PF Insights post

Perfect Secrecy and the Unbreakable Cipher

encryption.png


Continue reading the Original PF Insights Post.
 
  • Like
Likes billy_joule and Greg Bernhardt
Mathematics news on Phys.org
  • #3
Excellent!

Shannon's entropy model is used in a lot of disparate fields.

Ecology: Species diversity can be defined precisely as you described H, Shannon's entropy. If we limit an example to tree species: Boreal and montane systems have low diversity of tree species, cloud forest systems have very high diversity of tree species - such that you often have less than one individual of a given species per hectare. Abusing your nice model, it appears cloud forest species diversity would equate to a sample of glyphs from a language with thousands of "letters". If you mix in all of the species: trees, shrubs, epiphytes, invertebrates, vertebrates, Eukaryotes on down to single-celled Prokaryotes, etc., you easily have a language with an absurd number of "letters". No wonder we don't fully understand tropical systems.

Your explanation is far better than the one I used for years to help students to understand Shannon's entropy. Darn it all...
 
  • Like
Likes bapowell
  • #4
I can't say I understand all the math that well, but it was interesting read!
 
  • Like
Likes bapowell
  • #5
A good appraisal.
But after such a confident appraisal of “unbreakable” cryptographic systems I feel the need to point out that it is all too easy to be fixated and blinded by the theoretical security of your favourite cryptographic algorithm. The clear understanding your algorithm prevents you seeing the alternative openings that may be exploited by an enemy. The belief that you have a secure algorithm is also a liability because it distracts you from the greater weakness of the surrounding security structure.
Game theory rules the day, paranoia the night.
 
  • #6
Baluncore said:
A good appraisal.
But after such a confident appraisal of “unbreakable” cryptographic systems I feel the need to point out that it is all too easy to be fixated and blinded by the theoretical security of your favourite cryptographic algorithm. The clear understanding your algorithm prevents you seeing the alternative openings that may be exploited by an enemy. The belief that you have a secure algorithm is also a liability because it distracts you from the greater weakness of the surrounding security structure.
Game theory rules the day, paranoia the night.
That's generally true, except when you have a provably secure encryption scheme. There is only one such scheme---the Vernam system. If the key is truly random, the Vernam cipher is theoretically unbreakable, as I hoped to demonstrate in this article.
 
  • #7
bapowell said:
That's generally true, except when you have a provably secure encryption scheme. There is only one such scheme---the Vernam system. If the key is truly random, the Vernam cipher is theoretically unbreakable, as I hoped to demonstrate in this article.
The Vernam cipher has perfect secrecy -- disclosure of the ciphertext alone does not give the attacker any information about the message. However, secrecy is not the only goal in security. For instance, one might want immunity from message forgery.

The classic example is an attacker who knows the plaintext and can modify "Attack at dawn" to "Attack at dusk" without knowledge of the key.
 
Last edited:
  • Like
Likes bapowell

What is perfect secrecy?

Perfect secrecy refers to a level of security in which the contents of a message cannot be deciphered by anyone who does not possess the specific key or code. This means that even if an attacker has unlimited computing power and time, they will not be able to break the encryption and access the message.

What is an unbreakable cipher?

An unbreakable cipher, also known as a "one-time pad", is a cryptographic method that uses a random key of the same length as the message. This key is only used once and then destroyed, making it impossible for an attacker to break the cipher and access the message.

How is perfect secrecy achieved?

Perfect secrecy is achieved by using an unbreakable cipher, such as the one-time pad. This ensures that the key used to encrypt the message is completely random and cannot be guessed or predicted by an attacker. Additionally, the key must be kept completely secret and only shared between the sender and intended recipient.

What are the limitations of perfect secrecy?

While perfect secrecy provides a high level of security, it is not always practical or feasible to use in all situations. One limitation is the need to have a truly random and secret key of the same length as the message. This can be difficult to generate and securely share. Additionally, the key can only be used once, which can be inconvenient for long-term communication.

What are some real-world applications of perfect secrecy?

Perfect secrecy has been used in military communications, specifically during World War II, to protect sensitive information from being intercepted and deciphered by enemy forces. It is also used in some modern communication systems, such as satellite transmissions, to ensure secure and private communication.

Similar threads

Replies
7
Views
1K
  • General Math
Replies
8
Views
2K
  • General Math
Replies
13
Views
2K
  • General Math
Replies
5
Views
2K
Replies
25
Views
5K
  • General Math
Replies
26
Views
4K
  • General Math
4
Replies
105
Views
11K
  • General Math
Replies
2
Views
1K
  • General Math
Replies
12
Views
2K
  • General Math
Replies
7
Views
2K
Back
Top