Hyper-encryption is a form of encryption invented by Michael O. Rabin which uses a high-bandwidth source of public random bits, together with a secret key that is shared by only the sender and recipient(s) of the message.[1] It uses the assumptions of Ueli Maurer's bounded-storage model as the basis of its secrecy. Although everyone can see the data, decryption by adversaries without the secret key is still not feasible, because of the space limitations of storing enough data to mount an attack against the system.
Unlike almost all other cryptosystems except the one-time pad, hyper-encryption can be proved to be information-theoretically secure, provided the storage bound cannot be surpassed. Moreover, if the necessary public information cannot be stored at the time of transmission, the plaintext can be shown to be impossible to recover, regardless of the computational capacity available to an adversary in the future, even if they have access to the secret key at that future time.
A highly energy-efficient implementation of a hyper-encryption chip was demonstrated by Krishna Palem et al. using the Probabilistic CMOS or PCMOS technology and was shown to be ~205 times more efficient in terms of Energy-Performance-Product.[2][3]
See also
References
- ↑ Rabin, M.O. (2005-10-19). "Provably unbreakable hyper-encryption in the limited access model" (PDF). IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005. pp. 34–37. doi:10.1109/ITWTPI.2005.1543953. ISBN 978-0-7803-9491-9. S2CID 16850139. Archived from the original on 2017-09-14. Retrieved 2021-04-30.
{{cite book}}
: CS1 maint: bot: original URL status unknown (link) - ↑ "Revolutionary microchip uses 30 times less power". Rice University. Archived from the original on 2012-02-18. Retrieved 2012-07-28.
- ↑ Lakshmi N. Chakrapani; Bilge E. S. Akgul; Suresh Cheemalavagu; Pinar Korkmaz; Krishna V. Palem; Balasubramanian Seshasayee. "Ultra Efficient Embedded SOC Architectures based on Probabilistic CMOS (PCMOS) Technology" (PDF). Design Automation and Test in Europe Conference (DATE), 2006. Archived (PDF) from the original on 2008-04-25.
Further reading
- Y. Z. Ding and M. O. Rabin. Hyper-encryption and everlasting security. In 19th Annual Symposium on Theoretical Aspects of Computer Science (STACS), volume 2285 of Lecture Notes in Computer Science, pp. 1–26. Springer-Verlag, 2002.
- Jason K. Juang, Practical Implementation and Analysis of Hyper-Encryption. Masters dissertation, MIT Department of Electrical Engineering and Computer Science, 2009-05-22.
External links
- Lu, Chi-Jen (18–22 August 2002). "Hyper-Encryption against Space-Bounded Adversaries from On-Line Strong Extractors". Advances in Cryptology – CRYPTO '02, Lecture Notes in Computer Science. Springer-Verlag. Archived from the original on 2015-04-29.
{{cite journal}}
: Cite journal requires|journal=
(help) - Dziembowski, Stefan; Maurer, Ueli (May 19, 2002). "Tight security proofs for the bounded-storage model". Proceedings of the thiry-fourth annual ACM symposium on Theory of computing (PDF). pp. 341–350. doi:10.1145/509907.509960. ISBN 978-1581134957. S2CID 11042024. Archived from the original (PDF) on 2017-07-06.</ref>
- , video of a lecture by Professor Michael O. Rabin.