The Odyssey of Entropy: Cryptography
Abstract
:1. Introduction
2. Entropy Measures and Related Concepts
2.1. Entropy Measures
2.2. Related Concepts
3. Entropy and Encryption
3.1. Modeling, Design and Implementation
3.1.1. Security Models Related to Entropy
- Entropic Security: Entropic security is a relaxed version of semantic security. In semantic security, only negligible information about the plaintext can be extractable (in any feasible way) from the ciphertext. More specifically, suppose that a probabilistic polynomial time algorithm (PPTA) knows the ciphertext c generated from a message m (regardless of the related distribution) and the length of m. The algorithm should still be unable to extract any partial information regarding m with a probability that is non-negligibly larger than all other PPTAs that know only the length of m (and not c).In entropic security, the cryptosystem needs to guarantee that the entropy of the message space is high from the point of view of the adversary [34]. A few research reports have worked on entropic security for high-entropy plaintexts [35]. Moreover, this model was used in honey encryption [36]. In honey encryption, decrypting the ciphertext using an incorrect key (guessed by the adversary) leads to a meaningful, but incorrect plaintext, which fools the adversary.
- Unconditional Security: A cryptosystem is said to have unconditional security (also called information-theoretic security) if the system is secure against adversaries with unlimited computational power, resources, memory space, and time. Information-theoretic methods and techniques have been utilized in studying unconditionally secure cryptosystems [37]. Some researchers have focused on this security model. For example, Renner and Wolf [38] investigated the possibility of asymmetric unconditional security, which corresponds to asymmetric-key cryptography in the computational security model.
- Provable Security: Some researchers have used entropy in provable security. For example, Kim et al. [39] argued that the assumption of uniform key distribution, which is made in traditional provable security, is far from reality. They modeled realistic key distributions by entropy sources. As another example, it was shown by Ruana [40] that the explicit authenticated key agreement protocol presented by Zheng [41] is vulnerable to impersonation attack due to the low entropy of the keys.
- Perfect Secrecy: Perfect secrecy (defined by Shannon) guarantees that , where P is the set of possible values for the plaintext and C denotes the set of possible values for the ciphertext. Put alternatively, a cryptosystem is perfectly secure if the adversary is unable to make any guesses about the plaintext, even in the case of full access to the channel (and, consequently, to the ciphertext). Several research works have focused on perfect secrecy. Gersho [42] argued that message quality degradation is inevitable for a perfectly secure cryptosystem that encrypts an analog message using a digital key with a finite size. He designed a perfectly secure analog signal encryption scheme that keeps the bandwidth of the encrypted signal from growing above that of the original analog signal without altering the key size or increasing the quality degradation incurred on the decrypted signal. The notion of “finite-state encryptability” for an individual plaintext sequence was introduced by Merhav [43] as the minimum asymptotic key rate required to guarantee perfect secrecy for that sequence. He demonstrated that the finite-state encryptability is equal to the finite-state compressibility (defined by Ziv and Lempel [44]) for every individual sequence. Perfect secrecy in radio signal encryption using DFT (discrete Fourier transform) was studied by Bi et al. [45]. They proved perfect secrecy to be asymptotically achievable for any baseband signaling method, provided that the signal block length approaches infinity. It is well known that the only real-world implementation of perfect secrecy (in its pure notion) is one-time pad (OTP), wherein the key is at least as long as the plaintext and needs to be updated with each new plaintext. However, some variants of perfect secrecy have received research focus. In the following, we review some well-studied variants of perfect secrecy as well as some related research works.
- -
- Perfect Forward Secrecy:Perfect forward secrecy depends on frequent changes in the encryption/decryption key (e.g., with each call or each message in a conversation, or each web page reload) in order to prevent the cryptosystem from being broken if a key is compromised. Several researchers have proposed encryption systems providing perfect forward secrecy to be used in different communication systems. For example, two email protocols with perfect forward secrecy were proposed by Sun et al. [46]. However, some flaws in the reasoning presented by Sun et al. [46] were reported by Dent [47], and two new robust email protocols with guaranteed perfect forward secrecy were introduced by Ziv and Lempel [48]. Later on, a method for cryptanalysis of the protocols proposed by Ziv and Lempel [48] was presented by Yoon and Yoo [49].In recent years, perfect forward secrecy has been considered in several other areas. For example, a lightweight transport layer security protocol with perfect secrecy was proposed by Pengkun et al. [50]. As another example, perfect secrecy is guaranteed to be provided by a high-performance key agreement protocol proposed by Yang et al. [51].
- -
- One-Time Pad (OTP):OTP is the only perfectly secure cryptographic scheme used in real-world applications. Although some researchers believe that OTP is more of a key safeguarding scheme than a cryptosystem [52], a vast number of research works have considered OTP as (part of) the security solution in a broad spectrum of applications. The feasibility of perfectly secure cryptography using imperfect random sources was studied by Dodis and Spencer [53]. Liu et al. [54] proposed an OTP cryptosystem in which the receiver does not need the OTP to decrypt the ciphertext, while the OTP fully affects the plaintext from the adversaries point of view. The application of OTP in scenarios where the receiver may not be trustworthy was studied by Matt and Maurer [55].An OTP-based cryptosystem was proposed by Büsching and Wolf [56] for BANs (body area networks), wherein messages are short, and large volumes of NVM (non-volatile memory) are available. This cryptosystem stores pre-calculated OTPs in the NVM for future use. Moreover, OTPs have been used in a spectrum of environments, such as multi-user one-hop wireless networks [57], IMDs (implantable medical devices) [58], UAVs (ynmanned aerial vehicles) [59], medical images [60], mobile instant messaging [61], coded networks [62] and credit cards [63]. OTP has been also used in quantum computing, especially in QKD (quantum key distribution) [64,65,66,67,68,69,70].
3.1.2. Cryptosystem Elements
- Encryption and Decryption Algorithms: Entropy has played a role in several research reports focusing on the design of encryption and decryption algorithms. Some of these research works are discussed below.
- -
- Encryption:The role of image block entropy in image encryption was studied by researchers [72] just like the case of image steganography (reviewed in Section 4.3.1). A multimedia encryption scheme based on entropy coding with low computational overhead was proposed by Xie and Kuo [73]. A method for encrypting entropy-coded compressed video streams without the need for decoding was introduced by Almasalha et al. [74]. Moreover, the encryption of entropy-coded videos was studied in some other research works. To mention a few, one may refer to Refs. [75,76,77,78]. The impact of key entropy on the security of an image encryption scheme was studied by Ye et al. [79]. Külekci [80] investigated the security of high-entropy volumes, where the most typical sources are entropy-encoded multimedia files or compressed text sequences. Min entropy was used by Saeb [81] to reduce the size of the key search space of an encryption scheme to a value lower than that of a brute-force or birthday attack. A chaotic encryption scheme for low-entropy images was proposed by Yavuz et al. [82]. This method uses confusion and diffusion techniques to make it difficult for the adversary to perform statistical analysis on adjacent pixels, which are likely to have close values.
- -
- Decryption:There are few works focusing on the security of the encryption algorithm. For example, the multiple decryption problem was introduced by Domaszewicz and Vaishampayan [83] as a generalization of the problem of source coding subject to a fidelity criterion. They used entropy to evaluate the security of a multiple-channel system in this scenario.
- Key Generation and Management Module: Several research works have focused on the role of entropy in key generation and management. Some of these works are briefly reviewed in the following.The entropy of the key has been of interest to researchers as a measure of security for decades [84]. Golic and Baltatu [85] used Shannon entropy analysis to evaluate the security of their proposed biometric key generation scheme. Wang et al. [86] tried to alleviate the quantization discrepancy problem in quantization-based key generation methods using an ECQS (entropy-constrained-like quantization scheme).It was highlighted by Shikata [87] that the existing bounds on the key entropy for retaining information-theoretical security are not tight enough. The reason is that existing random number generators do not create truly random sequences. More realistic bounds for the key entropy were derived in this research. "Personal Entropy" was introduced by Ellison et al. [88] as a means for remembering personal passphrases based on which secret keys are generated. Personal entropy is created via asking the user several personal questions.
- Key Agreement and Exchange Protocol: There are a few research works focusing on the applications of entropy in key exchange protocols. Among these works, we can refer to a framework designed by Luo et al. [89] for fingerprinting key exchange protocols using their impact on high-entropy data blocks. Another example is the key transmission method presented by Boyer and Delpha [90] for MISO (multiple-input single-output) flat-fading channels. This method tries to increase relative entropy using an artificial noise in order to minimize the BER (bit error rate) for the key receiver, while keeping it close to unity (maximum) for the eavesdropper.
3.1.3. Cryptographic Primitives
- Random Number Generation Algorithm: Entropy has been considered by researchers as a measure for randomness for decades [91]. One well-known issue with pseudo-random number generators is that the entropy of their output depends on the entropy of the seed. This issue was reported by Kim et al. [92] to exist in entropy sources of random number generators used in real-world cryptographic protocols, such as SSL (secure socket layer). Several research works have proposed methods for increasing the entropy of the seed via harvesting entropy from execution times of programs [93] or chaotic functions [94]. In recent years, entropy has been used as an objective for improving different chaos-based random number generators [95,96] as well as randomness tests for image encryption [97,98]. The criticality of entropy in research on true random number generators is due to the fact that their susceptibility to process variations as well as intrusion attacks, degrades the generated entropy. This makes it necessary to include an on-the-fly mechanism for the detection and correction of bias variations [99].
- Hashing Functions and Algorithms: A hash function with maximized conditional entropy was used by Lin et al. [100] as part of the solution to the ANN (approximate nearest neighbor) problem. Later on, Wang et al. [101] suggested LSH (locality sensitive hashing) as a promising solution to the ANN problem. However, they argued that in LSH, points are often mapped to poor distributions. They proposed a number of novel hash map functions based on entropy to alleviate this problem. Maximum-entropy hash functions were used in some other applications, such as packet classification [102]. The role of graph entropy in perfect hashing was studied by Newman et al. [103]. Later on, a graph entropy bound was calculated by Arikan [104] for the size of perfect hash function families. A fuzzy hash method based on quantum entropy distribution was used to construct a biometric authentication algorithm by Cao and Song [105]. Entropy measurement and improvement techniques were used by Zhang et al. [106] along with perceptual hashing for key frame extraction in content-based video retrieval. Moreover, entropy reduction on layout data combined with lossless compression and cryptographic hashing was used by Koranne et al. [107] to manage IP (intellectual property) via tracking geometrical layout from design through manufacturing and into production. Inaccessible entropy was used in the design of one-way hash functions by Haitner et al. [108]. A generator G is said to have inaccessible entropy if the total accessible entropy (calculated over all blocks blocks) is considerably smaller than the real entropy of G’s output. The possibility of designing a hash function with a hash-bit-rate equal to the conditional entropy was investigated by Li et al. [109].
3.1.4. Cryptographic Hardware
- Hardware Random Number Generators: The metal oxide semi-conductor (CMOS) implementation of full-entropy true random number generators was investigated by Mathew et al. [110,110]. CMOS is a fabrication process used in integrated circuits with high noise immunity and low static power consumption. Cicek et al. [111] proposed architectures for the CMOS implementation of true random number generators with dual entropy cores. In these implementations, different entropy sources, such as MRAMs [112], beta radioisotopes [113], the jitter of event propagation in self-timed rings [114] or thermal phenomena [115], were examined by researchers. Other hardware implementations depend on field programmable gate arrays (FPGAs) [116,117] or system-on-chip (SoC) devices [115]. An FPGA is a programmable semiconductor device consisting of a matrix of configurable logic blocks connected via networks of bistate connections. Furthermore, an SoC is a single integrated circuit containing (almost) all components of a computer such as a central processing unit, secondary storage, input/output ports, memory, etc. In the hardware implementation of true random number generators, objectives, such as power consumption [118], were considered by researchers.
- Physically Unclonable Functions (PUFs): In recent years, it was shown that some unclonable properties in some elements such as devices, waves or materials can vary randomly in different experiments or uniquely between similar elements. PUFs use these properties to create random and/or unique signals. They are used in cryptographic primitives, such as random number generation as well as message/device authentication. PUFs have been of interest to researchers in recent years [119,120]. The architecture of a PUF is shown in Figure 3.As shown in Figure 3, the core of a PUF is an unclonable element to which we simply refer as the element for short. The element can be a material, such as paper, carbon nanotube, etc. It can even be a wave, such as an optical or magnetic wave. However, most commonly, it is a device. It varies from sensors to microprocessors. The element along with its unique/random property (property for short) build the source of uniqueness/randomness (source for short). The property varies from eye-opening oscillation in humans to the geometry of the substrate in CMOS devices. As shown in Figure 3, an extraction circuit extracts this randomness, and (possibly) some post-processing improves the performance of the resulting signal to create the final output signal.Entropy analysis has appeared in several research reports focusing on the implementation of PUFs. For example, a connection between the min entropy and the randomness of PUFs was established by Gu et al. [121]. Gu et al. [122] and Schaub et al. [123] used entropy to evaluate the randomness of PUFs. Similarly, Koyily et al. [124] used entropy to evaluate the non-linearity of PUFS. Upper bounds on the entropy of some types of PUFs were calculated by Delvaux et al. [21]. Some bounds on the conditional min entropy of PUFs were presented by Wilde et al. [125]. Liu et al. [119] argued that some previously calculated upper/lower bounds on the entropy of PUFs are too loose or too conservative. They proposed a method for calculating a new bound via predicting the expectation of the point where min entropy bounds obtained from different experiments will converge. The loss of entropy in key generation using PUFs was studied by Koeberl et al. [126]. Other research works used PUFs as pumps of entropy [120].
3.1.5. Modification and Use of Existing Cryptosystems
3.2. Analysis and Evaluation
3.2.1. Entropy as a Security Measure
- As an Independent Measure: Entropy is a widely used security measure. Among the research works that have used entropy as an independent measure for evaluating cryptographic schemes, one may refer to the following. A multichannel system was introduced by Voronych et al. [135] for the purpose of structuring and transmitting entropy-manipulated encrypted signals. Schulman [136] argued that entropy makes a cryptographic pseudo-random number generator indistinguishable from a truly random number generator. He studied different ways of creating and increasing entropy. A method was introduced by Wua et al. [97] to measure the entropy of small blocks in an encrypted image. The average of the entropy over the blocks of an image was suggested as an efficient measure for evaluating the security of an image encryption scheme.
- Relation with Other Cryptographic Measures: In the following, we study the research works that have established connections between entropy and other security measures, such as unicity distance, malleability, guesswork, confusion, diffusion and indistinguishability.
- -
- Unicity Distance:The unicity distance of a cryptosystem is defined as the minimum number of ciphertext bits needed for an adversary with unlimited computational power to recover the key. The connection between entropy and unicity distance has been of interest to some researchers. For example, an entropy analysis presented by AlJabri [137] highlighted the unicity distance as an upper bound on the probability of the key being guessed by an eavesdropper.
- -
- Malleability:Consider a cryptosystem and a function f. Let us assume that encrypts a plaintext p to a ciphertext c, and encrypts to . If there is a transform g that guarantees , then is called a malleable cryptosystem with respect to the function f. The notion of non-malleable extractors was introduced by Dodis and Wichs [138] (inspired by the notion of malleability) for the purpose of symmetric-key cryptography from low-entropy keys. Later on, a widely believed conjecture on the distribution of prime numbers in arithmetic progressions was used by Dodis et al. [139] along with an estimate for character sums in order to build some new non-malleable extractors. Moreover, entropy analysis was used by Cohen et al. [140] to present an unconditional construction for non-malleable extractors with short seeds. Recently, some researchers worked on entropy lower bounds for non-malleable extractors [141].
- -
- Guesswork:There is a clear relation between entropy and guesswork. While entropy can be interpreted as the average number of guesses required by an optimal binary search attack to break a cryptosystem, guesswork is defined as the average number of guesses required in an optimal linear search attack scenario [142]. It was shown by Christiansen and Duffy [143] that if appropriately scaled, when the key is long enough, the expectation of the logarithm of the guesswork approaches the Shannon entropy of the key selection process. A similar research work studied the relation between guesswork and Rényi entropy [144]. Pliam [145] demonstrated that there cannot be any general inequality between Shannon entropy and the logarithm of the minimum search space size necessary to guarantee a certain level of guesswork. Another research reported by Malone and Sullivan [146] showed that entropy and guesswork cannot be interchangeably used in normal conditions. The LDP (large deviation principle) was used by Malone and Sullivan [147] to derive the moments of the guesswork for a source of information determined by a Markov chain. It was shown by Lundin [148] how entropy and guesswork can be simultaneously used to evaluate the security of selectively encrypted information.
- -
- Confusion and Diffusion:Confusion and diffusion are two properties suggested by Shannon [1] in order to make the statistical analysis of a cryptosystem as difficult as possible. Confusion states that the ciphertext is a complex function of several portions of the key, and this function cannot be simplified to an easily analyzable function. On the other hand, diffusion requires that each plaintext symbol affects several symbols in the ciphertext and each ciphertext symbol is a function of several symbols in the plaintext. This property diffuses the statistical structures of the plaintext over the symbols of ciphertext. The relation between entropy and the mentioned two properties were studied in several research works. For example, entropy was used to evaluate the security of chaotic confusion–diffusion image encryption schemes [149,150]. Moreover, Wu et al. [151] used entropy improvement techniques in combination with confusion and diffusion mechanisms in their proposed cryptographic schemes.
- -
- Indistinguishability:Indistinguishability states that given the ciphertext corresponding to a plaintext randomly chosen from a plaintext space with only two elements (determined by the adversary), the adversary will not be able to identify the encrypted message with a probability significantly greater than that of random guessing (). Indistinguishability plays a significant role in provable security. Some research works have investigated the relation between indistinguishability and entropy. As an example, one may refer the research reported by Hayashi [152]. In this research, smoothed Rényi entropy and min entropy were used to evaluate the indistinguishability of universal hash functions. Universal hash functions have many important applications in QKD (quantum key distribution), cryptography, privacy amplification (leftover hash lemma), error-correcting codes, parallel computing, complexity theory, pseudorandomness, randomness extractors, randomized algorithms, data structures, etc. (see [153,154,155,156,157,158] and the references therein).
3.2.2. Applications in Security Proof
- Zero-Knowledge Proof:Zero-knowledge proof is about proving the possession of some information by one party (the prover) to the other party (the verifier) without revealing the information itself. Zero-knowledge proofs are widely studied in cryptography. Goldreich et al. [159] further developed the notion of non-interactive statistical zero-knowledge proof introduces by De Santis et al. [160]. They used entropy measures to highlight some conditions under which every statistical zero-knowledge proof can be made non-interactive. Lovett and Zhang [161] studied some black box algorithms in order to be used in zero-knowledge proofs. These algorithms can reverse the entropy of a function. It was shown in this report that a black box function of this type incurs an exponential loss of parameters, which makes it impossible for such an algorithm to be implemented in an efficient way. A new hard problem related to lattices, named ILP (isometric lattice problem) was introduced by Crépeau and Kazmi [162], who used entropy to show that there is an efficient zero-knowledge proof for this problem.
- Random Oracle:Random oracles are widely used in security proofs in order to model perfect hash algorithms. A random oracle is a hypothetical black box that responds to each query by producing a truly random number uniformly chosen from a predefined domain. There are a few research works that use entropy-related concepts in the analysis of random oracles. For example, it was demonstrated by Muchnik and Romashchenko [163] that random oracles cannot help the extraction of mutual information.
3.2.3. Applications in Adversarial Analysis
- Cryptanalysis: Entropy measures have been frequently used in research works focusing on cryptanalysis [166]. In particular, chaotic image encryption methods were cryptanalyzed using entropy calculations [167]. Moreover, some researchers used different methods for the cryptanalysis of chaotic image encryption schemes that use entropy improvement techniques [168].
- Eavesdropping: Measures of mutual information in quantum key distribution and their applications in eavesdropping were investigated by Rastegin [30].
- Encrypted Data Analysis: The analysis of encrypted data is another relevant area of application for entropy. For example, entropy analysis was used for identifying encrypted malware [169], detecting encrypted executable files [170], and correcting noisy encrypted images [171]. Moreover, some researchers focused on entropy analysis of encrypted strings [172].
- Covert Channel: Entropy has played role in research on adversarial analysis of cryptosystems via covert channels. For example, entropy was used by Chen et al. [173] to analyze the capacity of a covert channel as well as the factors affecting it.
- Attacks: Entropy analysis was used as part of several kinds of attack scenarios. To mention a few, we can refer to the following.
- -
- CPA (Chosen Plaintext Attack):Kiltz et al. [174] used entropy measures in their analysis of instantiability of RSA and optimal asymmetric encryption padding (OAEP) under a chosen plaintext attack. OAEP is a padding scheme proposed by Bellare and Rogaway [175], which is often used along with RSA encryption. In another research reported by Bard [176], entropy was used in a CPA against SSL. Moreover, Bard [177] tested several modes of operation for resistance against a blockwise adaptive chosen plaintext attack.
- -
- CCA (Chosen Ciphertext Attack):Like the case of chosen plain text attack, entropy analysis has played role in chosen ciphertext attack adversarial analysis. For example, a public-key cryptosystem featuring resistance against CCA was introduced by Zhao et al. [178]. Entropy assessment was used in order to prove the security of this cryptosystem against after-the-fact leakage without non-interactive zero-knowledge proof. Similarly, Sun et al. [179] presented a CCA-secure identity-based encryption system and used entropy to show its resistance against key leakage attacks. Another research study on CCA-resistant and leakage-resistant cryptosystems was reported by Zhou et al. [180] in which entropy was used in the security proof.
- -
- Side Channel Attack:Mutual information measure is frequently used in side channel attacks. The reason is that mutual information is capable of detecting any kind of statistical dependency, and many side channel analysis scenarios depend on a linear correlation coefficient as a wrong-key distinguisher [181]. Moreover, some research works have used entropy analyses to make cryptosystems more secure against side channel attacks. For example, a method for decreasing the entropy of the information leaked from side channels was introduced by Dhavlle et al. [182]. As another example, an information-theoretical model for side channel attacks was derived by Köpf and Basin [183]. The impact of the entropy of the masks in masking-based countermeasures against side channel attacks was studied by Nassar et al. [184]. This study shows that while these countermeasures are usually studied with the maximal possible entropy for the masks, some particular mask subsets may leak remarkably more as the entropy increases.
- -
- Replay Attack:Entropy analysis has been used in the detection of replay attacks. As an example, we can mention the research reported by Liu et al. [185], wherein a novel feature based on spectral entropy was introduced for detecting replay attacks.
- -
- Key Negotiation Attack:
- -
- Backdoor Attack:As an example of the applications of entropy in backdoor attacks, we can mention the research reported by Young and Yung [188]. They argued that some backdoor attacks, such as Monkey, require the attacker to obtain a large number of ciphertext blocks all encrypted by the same symmetric key, each containing one known plaintext bit. They proposed a new backdoor that eliminates the need for known plaintext while leaking a bound on the plaintext entropy to the reverse engineer.
- -
- Dictionary Attack:Some researchers have worked on the role of entropy in dictionary attacks. For example, it was shown by Nam et al. [189] that low-entropy keys make some PAKE (password-authenticated key exchange) protocols, such as the one presented by Abdalla and Pointcheval [190], vulnerable to dictionary attacks.
- -
- Algebraic Attack:In addition to dictionary attacks, low-entropy keys make cryptosystems vulnerable to algebraic attacks. For example, the complexity of finding low-entropy keys using SAT (Boolean satisfactory problem) solvers was studied by Hromada et al. [191].
- -
- Collision Attack:It was demonstrated by Rock [192] that replacing random permutations by random functions for the update of a stream cipher causes entropy loss, which makes the cipher vulnerable to collision attacks.
- -
- Correlation Attack:Wiemers and Klein [193] argued that the correlation-enhanced power analysis collision attack against AES proposed by Moradi et al. [194] usually yields a set of keys (instead of one) due to noise-related problems. To alleviate this problem, they proposed a practical search algorithm based on a theoretical analysis on how to quantify the remaining entropy.
3.2.4. Analysis of Well-Known Cryptographic Schemes
- Analysis of Emerging Cryptographic Paradigms:In addition to traditional cryptographic schemes, entropy has been used in research on cutting edge cryptographic schemes and paradigms, such as quantum cryptography, homomorphic encryption, white-box cryptography and attribute-based encryption. Some related research works are briefly reviewed in the following.
- -
- Quantum Cryptography:Entropy was used by Bienfang et al. [200] and Bienfang et al. [201] in order to evaluate OTP video stream encryption that use quantum-generated secret keys. Arnon-Friedman et al. [202] used entropy to analyze the security of a device-independent quantum cryptography scheme. Moreover, entropy was used in several research works for the purpose of evaluating QKD (quantum key distribution) protocols [203,204].
- -
- Attribute-Based Encryption:A technique aimed at increasing the entropy available for proving the security of dual system encryption schemes under decisional linear assumption was presented by Kowalczyk and Lewko [205]. They showed the efficiency of their method in an attribute-based encryption scheme as a case study.
3.2.5. Analysis of Cryptographic Problems and Functions
3.3. Application
4. Entropy and Other Cryptographic Areas
4.1. Obfuscation
4.2. Message Authentication Codes
4.3. Cryptography-Based Privacy
4.3.1. Steganography and Steganalysis
4.4. User/Device Authentication
4.5. Digital Signature
4.6. Secret Sharing
5. Concluding Remarks
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef] [Green Version]
- Shannon, C.E.; Weaver, W. The Mathematical Theory of Communication; The University of Illinois Press: Champaign, IL, USA, 1949. [Google Scholar]
- Hartley, R.V. Transmission of information 1. Bell Syst. Tech. J. 1928, 7, 535–563. [Google Scholar] [CrossRef]
- Rényi, A. On measures of information and entropy. In Proceedings of the fourth Berkeley Symposium on Mathematics, Statistics and Probability; University of California Press: Berkeley, CA, USA, 1960. [Google Scholar]
- Makkuva, A.V.; Wu, Y. Equivalence of additive-combinatorial linear inequalities for Shannon entropy and differential entropy. IEEE Trans. Inf. Theory 2018, 64, 3579–3589. [Google Scholar] [CrossRef]
- Zhou, L.; Sood, K.; Xiang, Y. ERM: An accurate approach to detect DDoS attacks using entropy rate measurement. IEEE Commun. Lett. 2019, 23, 1700–1703. [Google Scholar] [CrossRef]
- Yin, X.; Zhang, Q.; Wang, H.; Ding, Z. Rbfnn-based minimum entropy filtering for a class of stochastic nonlinear systems. IEEE Trans. Autom. Control. 2019, 65, 376–381. [Google Scholar] [CrossRef] [Green Version]
- Hellman, Z.; Peretz, R. A survey on entropy and economic behaviour. Entropy 2020, 22, 157. [Google Scholar] [CrossRef] [Green Version]
- Du, Y.; Wang, J.; Guo, S.-M.; Thouin, P. Survey and comparative analysis of entropy and relative entropy thresholding techniques. IEE-Proc.-Vision Image Signal Process. 2006, 153, 837–850. [Google Scholar]
- Evans, L. A survey of entropy methods for partial differential equations. Bull. Am. Math. Soc. 2004, 41, 409–438. [Google Scholar] [CrossRef]
- Lin, D.; Wong, E.K. A survey on the maximum entropy method and parameter spectral estimation. Phys. Rep. 1990, 193, 41–135. [Google Scholar] [CrossRef]
- Maurer, U.M. The role of information theory in cryptography. In Proceedings of the Fourth IMA Conference on Cryptography and Coding, Cirencester, UK, 13–15 December 1993; pp. 49–71. [Google Scholar]
- Reyzin, L. Some notions of entropy for cryptography. In Proceedings of the International Conference on Information Theoretic Security; Springer: Berlin/Heidelberg, Germany, 2011; pp. 138–142. [Google Scholar]
- Vassilev, A.; Hall, T.A. The importance of entropy to information security. Computer 2014, 47, 78–81. [Google Scholar] [CrossRef]
- Yao, Y.; Li, Z. Security of weak secrets based cryptographic primitives via the Renyi entropy. IET Inf. Secur. 2016, 10, 442–450. [Google Scholar] [CrossRef]
- Dodis, Y.; Yu, Y. Overcoming weak expectations. In Proceedings of the IEEE Information Theory Workshop, Lausanne, Switzerland, 3–7 September 2012. [Google Scholar]
- Boztas, S. On Rényi entropies and their applications to guessing attacks in cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2014, 97, 2542–2548. [Google Scholar] [CrossRef] [Green Version]
- Skórski, M. Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint; Springer: Cham, Switzerland, 2015; pp. 257–274. [Google Scholar]
- Liu, Y.; Zhang, D.; Deng, Y.; Li, B. (Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy. Cybersecurity 2019, 2, 18. [Google Scholar] [CrossRef]
- Zhang, D.; Li, J.; Li, B.; Lu, X.; Xue, H.; Jia, D.; Liu, Y. Deterministic identity-based encryption from lattice-based programmable hash functions with high min-entropy. Secur. Commun. Netw. 2019, 2019, 1816393. [Google Scholar] [CrossRef] [Green Version]
- Delvaux, J.; Gu, D.; Verbauwhede, I. Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs. In Proceedings of the IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), Yilan, Taiwan, 19–20 December 2016. [Google Scholar]
- Perazzone, J.B.; Paul, L.Y.; Sadler, B.M.; Blum, R.S. Physical layer authentication via fingerprint embedding: Min-entropy analysis: Invited presentation. In Proceedings of the 2019 53rd Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 20–22 March 2019; pp. 1–6. [Google Scholar]
- Graves, E.; Kirby, B.; Yu, P. Messages per secret bit when authentication and a min-entropy secrecy criterion are required. In Proceedings of the 2017 51st Annual Conference on Information Sciences and Systems (CISS); IEEE: Baltimore, MD, USA, 2017; pp. 1–6. [Google Scholar]
- Iwamoto, M.; Shikata, J. Secret sharing schemes based on min-entropies. In Proceedings of the 2014 IEEE International Symposium on Information Theory; IEEE: Honolulu, HI, USA, 2014; pp. 401–405. [Google Scholar]
- Arimoto, S. Information-theoretical considerations on estimation problems. Inf. Control 1971, 19, 181–194. [Google Scholar] [CrossRef] [Green Version]
- Markechová, D.; Mosapour, B.; Ebrahimzadeh, A. R-norm entropy and R-norm divergence in fuzzy probability spaces. Entropy 2018, 20, 272. [Google Scholar] [CrossRef]
- Kumar, S.; Choudhary, A. Shannon’s random-cipher result and the generalized r-norm entropy of type b. J. Cybersecur. Aware. Educ. 2019, 1, 768384. [Google Scholar]
- Biryukov, A.; Nakahara, J., Jr.; Yıldırım, H.M. Differential entropy analysis of the IDEA block cipher. J. Comput. Appl. Math. 2014, 259, 561–570. [Google Scholar] [CrossRef]
- MacKay, D.J. Information Theory, Inference and Learning Algorithms; Cambridge University Press: Cambridge, UK, 2003. [Google Scholar]
- Rastegin, A.E. On conclusive eavesdropping and measures of mutual information in quantum key distribution. Quantum Inf. Process. 2016, 15, 1225–1239. [Google Scholar] [CrossRef] [Green Version]
- Gierlichs, B.; Batina, L.; Tuyls, P.; Preneel, B. Mutual information analysis: A generic side-channel distinguisher. In Proceedings of the Cryptographic Hardware and Embedded Systems (CHES 2008), Washington, DC, USA, 10–13 August 2008. [Google Scholar]
- Iwamoto, M.; Shikata, J. Information theoretic security for encryption based on conditional Rényi entropies. In Proceedings of the Information Theoretic Security-7th International Conference (ICITS 2013), Singapore, 28–30 November 2013. [Google Scholar]
- Körner, J. Coding of an information source having ambiguous alphabet and the entropy of graphs. In Proceedings of the 6th Prague Conference on Information Theory, Prague, Czech Republic, 19–25 June 1973. [Google Scholar]
- Russell, A.; Wang, H. How to fool an unbounded adversary with a short key. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Amsterdam, The Netherlands, 2022; pp. 133–148. [Google Scholar]
- Dodis, Y.; Smith, A. Entropic security and the encryption of high entropy messages. In Proceedings of the Theory of Cryptography Conference; Springer: Berlin, Germany, 2005; pp. 556–577. [Google Scholar]
- Li, X.; Tang, Q.; Zhang, Z. Fooling an Unbounded Adversary with a Short Key, Repeatedly: The Honey Encryption Perspective. In Proceedings of the 2nd Conference on Information-Theoretic Cryptography (ITC 2021), Virtual, 19 July 2021. [Google Scholar]
- Cachin, C. Entropy Measures and Unconditional Security in Cryptography. Ph.D. Thesis, Swiss Federal Institute of Technology, Zurich, Switzerland, 1997. [Google Scholar]
- Renner, R.; Wolf, S. The exact price for unconditionally secure asymmetric cryptography. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques; Spring: Berlin, Germany, 2004. [Google Scholar]
- Kim, N.; Kang, J.-S.; Yeom, Y. A synthetic provable security evaluation of cryptographic application with entropy sources. In Proceedings of the International Conference on Security and Management, Las Vegas, NV, USA, 27–30 July 2015. [Google Scholar]
- Ruan, O.; Kumar, N.; He, D.; Lee, J.-H. Efficient provably secure password-based explicit authenticated key agreement. Pervasive Mob. Comput. 2015, 24, 50–60. [Google Scholar] [CrossRef]
- Zheng, M.; Zhou, H.; Chen, J. An efficient protocol for two-party explicit authenticated key agreement. Concurr. Comput. Pract. Exp. 2015, 27, 2954–2963. [Google Scholar] [CrossRef]
- Gersho, A. Perfect secrecy encryption of analog signals. IEEE J. Sel. Areas Commun. 1984, 2, 460–466. [Google Scholar] [CrossRef]
- Merhav, N. Perfectly secure encryption of individual sequences. IEEE Trans. Inf. Theory 2012, 59, 1302–1310. [Google Scholar] [CrossRef]
- Ziv, J.; Lempel, A. Compression of individual sequences via variable-rate coding. IEEE Trans. Inf. Theory 1978, 24, 530–536. [Google Scholar] [CrossRef] [Green Version]
- Bi, S.; Yuan, X.; Zhang, Y.J.A. DFT-based physical layer encryption for achieving perfect secrecy. In Proceedings of the 2013 IEEE International Conference on Communications (ICC); IEEE: Budapest, Hungary, 2013; pp. 2211–2216. [Google Scholar]
- Sun, H.-M.; Hsieh, B.-T.; Hwang, H.-J. Secure e-mail protocols providing perfect forward secrecy. IEEE Commun. Lett. 2005, 9, 58–60. [Google Scholar]
- Dent, A.W. Flaws in an e-mail protocol. IEEE Commun. Lett. 2005, 9, 718–719. [Google Scholar] [CrossRef]
- Kim, B.H.; Koo, J.H.; Lee, D.H. Robust e-mail protocols with perfect forward secrecy. IEEE Commun. Lett. 2006, 10, 510–512. [Google Scholar]
- Yoon, E.J.; Yoo, K.Y. Cryptanalysis of robust e-mail protocols with perfect forward secrecy. IEEE Commun. Lett. 2007, 11, 372–374. [Google Scholar] [CrossRef]
- Li, P.; Su, J.; Wang, X. ITLS: Lightweight transport-layer security protocol for IOT with minimal latency and perfect forward secrecy. IEEE Internet Things J. 2020, 7, 6828–6841. [Google Scholar] [CrossRef]
- Yang, Z.; He, J.; Tian, Y.; Zhou, J. Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things. IEEE Trans. Ind. Inform. 2019, 16, 6584–6596. [Google Scholar] [CrossRef]
- Blakley, G.R. One time pads are key safegaurding schemes, not cryptosystems. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 14–16 April 1980. [Google Scholar]
- Dodis, Y.; Spencer, J. On the (non)universality of the one-time pad. In Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, Vancouver, BC, Canada, 16–19 November 2002. [Google Scholar]
- Liu, S.; Hong, Y.; Viterbo, E. Unshared secret key cryptography: Achieving shannon’s ideal secrecy and perfect secrecy. In Proceedings of the IEEE Information Theory Workshop (ITW 2014), Hobart, TAS, Australia, 2–5 November 2014. [Google Scholar]
- Matt, C.; Maurer, U. The one-time pad revisited. In Proceedings of the IEEE International Symposium on Information Theory, Istanbul, Turkey, 7–12 July 2013. [Google Scholar]
- Büsching, F.; Wolf, L. The rebirth of one-time pads—Secure data transmission from ban to sink. IEEE Internet Things J. 2014, 2, 63–71. [Google Scholar] [CrossRef]
- Xie, J.; Ulukus, S. Secure degrees of freedom of multiuser networks: One-time-pads in the air via alignment. Proc. IEEE 2015, 103, 1857–1873. [Google Scholar] [CrossRef] [Green Version]
- Zheng, G.; Fang, G.; Shankaran, R.; Orgun, M.A. Encryption for implantable medical devices using modified one-time pads. IEEE Access 2015, 3, 825–836. [Google Scholar] [CrossRef]
- Avdonin, I.; Budko, M.; Budko, M.; Grozov, V.; Guirik, A. A method of creating perfectly secure data transmission channel between unmanned aerial vehicle and ground control station based on one-time pads. In Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Munich, Germany, 6–8 November 2017. [Google Scholar]
- Srivastava, A.; Awasthi, S.K.; Javed, S.; Gautam, S.; Kishore, N.; Bakthula, R. Seeded one time pad for security of medical images in health information. In Proceedings of the 4th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 14–15 December 2018. [Google Scholar]
- Chen, H.-C.; Wijayanto, H.; Chang, C.-H.; Leu, F.-Y.; Yim, K. Secure mobile instant messaging key exchanging protocol with one-time-pad substitution transposition cryptosystem. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, 10–14 April 2016. [Google Scholar]
- Zhang, Y.; Xu, C.; Wang, F. A novel scheme for secure network coding using one-time pad. In Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, China, 25–26 April 2009. [Google Scholar]
- Xu, D.; Lu, C.; Dos Santos, A. Protecting web usage of credit cards using one-time pad cookie encryption. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, NV, USA, 9–13 December 2002. [Google Scholar]
- Bennett, C.H.; Bessette, F.; Brassard, G.; Salvail, L.; Smolin, J. Experimental quantum cryptography. J. Cryptol. 1992, 5, 3–28. [Google Scholar] [CrossRef]
- Peev, M.; Nölle, M.; Maurhardt, O.; Lorünser, T.; Suda, M.; Poppe, A.; Ursin, R.; Fedrizzi, A.; Zeilinger, A. A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography. Int. J. Quantum Inf. 2005, 3, 225–231. [Google Scholar] [CrossRef] [Green Version]
- Portmann, C. Key recycling in authentication. IEEE Trans. Inf. Theory 2014, 60, 4383–4396. [Google Scholar] [CrossRef] [Green Version]
- Alléaume, R.; Branciard, C.; Bouda, J.; Debuisschert, T.; Dianati, M.; Gisin, N.; Godfrey, M.; Grangier, P.; Länger, T.; Lütkenhaus, N. Using quantum key distribution for cryptographic purposes: A survey. Theor. Comput. Sci. 2014, 560, 62–81. [Google Scholar] [CrossRef]
- Li, Q.; Zhao, Q.; Le, D.; Niu, X. Study on the security of the authentication scheme with key recycling in QKD. Quantum Inf. Process. 2016, 15, 3815–3831. [Google Scholar] [CrossRef]
- Bibak, K.; Ritchie, R.; Zolfaghari, B. Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash. Quantum Inf. Comput. 2021, 21, 181–202. [Google Scholar] [CrossRef]
- Bibak, K.; Ritchie, R. Quantum key distribution with PRF (Hash, Nonce) achieves everlasting security. Quantum Inf. Process. 2021, 20, 228. [Google Scholar] [CrossRef]
- Constantinesu, N. Estimators in cryptography. Annals. Comput. Sci. Ser. 2009, 7, 1–8. [Google Scholar]
- Al-Husainy, M.A.; Uliyan, D.M. Image encryption technique based on the entropy value of a random block. Image 2017, 8, 260–266. [Google Scholar]
- Xie, D.; Kuo, C.-C. Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream. Eurasip J. Inf. Secur. 2007, 2007, 35262. [Google Scholar] [CrossRef]
- Almasalha, F.; Hasimoto-Beltran, R.; Khokhar, A.A. Partial encryption of entropy-coded video compression using coupled chaotic maps. Entropy 2014, 16, 5575–5600. [Google Scholar] [CrossRef] [Green Version]
- Mian, C.; Jia, J.; Lei, Y. 264 video encryption algorithm based on entropy coding. In Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Kaohsiung, Taiwan, 26–28 November 2007. [Google Scholar]
- Wu, X.; Moo, P. Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients. In Proceedings of the IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 7–11 June 1999. [Google Scholar]
- Wang, L.-F.; Wang, W.-D.; Ma, J.; Wang, K.-Q.; Xiao, C. Format-Compliant Entropy Coding Encryption Algorithms for Wireless Video System. In Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, 12–17 October 2008. [Google Scholar]
- Mostafa, M.; Fakhr, M.W. Joint image compression and encryption based on compressed sensing and entropy coding. In Proceedings of the IEEE 13th International Colloquium on Signal Processing & its Applications (CSPA), Batu Ferringhi, Malaysia, 10–12 March 2017. [Google Scholar]
- Ye, G.; Pan, C.; Huang, X.; Zhao, Z.; He, J. A chaotic image encryption algorithm based on information entropy. Int. J. Bifurc. Chaos 2018, 28, 1850010. [Google Scholar] [CrossRef]
- Külekci, M.O. An ambiguous coding scheme for selective encryption of high entropy volumes. In Proceedings of the 17th International Symposium on Experimental Algorithms (SEA 2018), L’Aquila, Italy, 27–29 June 2018. [Google Scholar]
- Saeb, M. Reduction of Encryption Key Search Space Based on The Min-Entropy Approach. Int. J. Comput. Sci. Commun. Secur. (Ijcscs) 2018, 6, 77–80. [Google Scholar]
- Yavuz, E.; Yazıcı, R.; Kasapbaşi, M.C.; Yamaç, E. Enhanced chaotic key-based algorithm for low-entropy image encryption. In Proceedings of the 22nd Signal Processing and Communications Applications Conference (SIU), Trabzon, Turkey, 23–25 April 2014. [Google Scholar]
- Domaszewicz, J.; Vaishampayan, V. Design of Entropy Constrained Multiple-Decryption Scalar. In Proceedings of the IEEE International Symposium on Information Theory, San Antonio, TX, USA, 17–22 January 1993. [Google Scholar]
- Kelsey, J.; Schneier, B.; Hall, C.; Wagner, D. Secure applications of low-entropy keys. In Proceedings of the Information Security Workshop, Beijing, China, 17–19 September 1997. [Google Scholar]
- Golic, J.D.; Baltatu, M. Entropy analysis and new constructions of biometric key generation systems. IEEE Trans. Inf. Theory 2008, 54, 2026–2040. [Google Scholar] [CrossRef]
- Wang, X.; Thiele, L.; Haustein, T.; Wang, Y. Secret key generation using entropy-constrained-like quantization scheme. In Proceedings of the 23rd International Conference on Telecommunications (ICT), Thessaloniki, Greece, 16–18 May 2016. [Google Scholar]
- Shikata, J. Tighter bounds on entropy of secret keys in authentication codes. In Proceedings of the IEEE Information Theory Workshop (ITW), Kaohsiung, Taiwan, 6–10 November 2017. [Google Scholar]
- Ellison, C.; Hall, C.; Milbert, R.; Schneier, B. Protecting secret keys with personal entropy. Future Gener. Comput. Syst. 2000, 16, 311–318. [Google Scholar] [CrossRef]
- Luo, S.; Seideman, J.D.; Dietrich, S. Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure. In Proceedings of the IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 24–24 May 2018. [Google Scholar]
- Boyer, R.; Delpha, C. Relative-entropy based beamforming for secret key transmission. In Proceedings of the IEEE 7th Sensor Array and Multichannel Signal Processing Workshop (SAM), Hoboken, NJ, USA, 17–20 June 2012. [Google Scholar]
- Horibe, Y. Entropy and an optimal random number transformation (Corresp.). IEEE Trans. Inf. Theory 1981, 27, 527–529. [Google Scholar] [CrossRef]
- Kim, H.; Oh, J.; Jang, C.; Yi, O.; Han, J.; Wi, H.; Park, C. Analysis of the noise source entropy used in openssl’s random number generation mechanism. In Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, 16–18 October 2019. [Google Scholar]
- Wang, J.; Pan, J.; Wu, X. The entropy source of pseudo random number generators: From low entropy to high entropy. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, 1–3 July 2019. [Google Scholar]
- Hart, J.D.; Roy, R.; Murphy, T.E. Optical random number generation-harvesting entropy from noise and chaos. In Proceedings of the 51st Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 22–24 March 2017. [Google Scholar]
- Argyris, A.; Pikasis, E.; Syvridis, D. Gb/s one-time-pad data encryption with synchronized chaos-based true random bit generators. J. Light. Technol. 2016, 34, 5325–5331. [Google Scholar] [CrossRef] [Green Version]
- Ma, Y.; Chen, T.; Lin, J.; Yang, J.; Jing, J. Entropy estimation for ADC sampling-based true random number generators. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2887–2900. [Google Scholar] [CrossRef]
- Wu, Y.; Noonan, J.P.; Agaian, S. Shannon entropy based randomness measurement and test for image encryption. Inf. Sci. 2018, 1–23. [Google Scholar]
- Wu, Y.; Noonan, J.P.; Agaian, S. A novel information entropy based randomness test for image encryption. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, USA, 9–12 October 2011. [Google Scholar]
- Carreira, L.B.; Danielson, P.; Rahimi, A.A.; Luppe, M.; Gupta, S. Low-latency reconfigurable entropy digital true random number generator with bias detection and correction. IEEE Trans. Circuits Syst. Regul. Pap. 2020, 67, 1562–1575. [Google Scholar] [CrossRef]
- Lin, R.-S.; Ross, D.A.; Yagnik, J. Spec hashing: Similarity preserving algorithm for entropy-based coding. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Francisco, CA, USA, 13–18 June 2010. [Google Scholar]
- Wang, Q.; Guo, Z.; Liu, G.; Guo, J. Entropy based locality sensitive hashing. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan, 25–30 March 2012. [Google Scholar]
- Choi, L.; Kim, H.; Kim, S.; Kim, M.H. Scalable packet classification through rulebase partitioning using the maximum entropy hashing. IEEE/ACM Trans. Netw. 2009, 17, 1926–1935. [Google Scholar] [CrossRef] [Green Version]
- Newman, I.; Ragde, P.; Wigderson, A. Perfect hashing, graph entropy, and circuit complexity. In Proceedings of the Fifth Annual Structure in Complexity Theory Conference, Barcelona, Spain, 8–11 July 1990. [Google Scholar]
- Arikan, E. An improved graph-entropy bound for perfect hashing. In Proceedings of the IEEE International Symposium on Information Theory, Trondheim, Norway, 27 June–1 July 1994. [Google Scholar]
- Cao, D.; Song, Y. Biometric authentication constructed from quantum entropy distribution fuzzy hash. In Proceedings of the 12th International Conference on Signal Processing (ICSP), Hangzhou, China, 19–23 October 2014. [Google Scholar]
- Zhang, M.; Tian, L.; Li, C. Key frame extraction based on entropy difference and perceptual hash. In Proceedings of the IEEE International Symposium on Multimedia (ISM), Taichung, Taiwan, 11–13 December 2017. [Google Scholar]
- Koranne, S.; Ferguson, J.; Garg, B.; Khanna, M. Entropy-reduced hashing for physical IP management. In Proceedings of the 12th International Symposium on Quality Electronic Design, Santa Clara, CA, USA, 14–16 March 2011. [Google Scholar]
- Haitner, I.; Holenstein, T.; Reingold, O.; Vadhan, S.; Wee, H. Universal one-way hash functions via inaccessible entropy. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, French, 30 May–3 June 2010. [Google Scholar]
- Li, Z.; Wang, A.; Wang, H. Distributed video coding based on conditional entropy hash. In Proceedings of the International Conference on Computational Aspects of Social Networks, Taiyuan, China, 26–28 September 2010. [Google Scholar]
- Mathew, S.K.; Johnston, D.; Satpathy, S.; Suresh, V.; Newman, P.; Anders, M.A.; Kaul, H.; Agarwal, A.; Hsu, S.K.; Chen, G. μ RNG: A 300–950 mV, 323 Gbps/W All-Digital Full-Entropy True Random Number Generator in 14 nm FinFET CMOS. IEEE J. Solid State Circuits 2016, 51, 1695–1704. [Google Scholar] [CrossRef]
- Cicek, I.; Pusane, A.E.; Dundar, G. An integrated dual entropy core true random number generator. IEEE Trans. Circuits Syst. Ii Express Briefs 2016, 64, 329–333. [Google Scholar] [CrossRef]
- Yang, K.; Dong, Q.; Wang, Z.; Shih, Y.-C.; Chih, Y.-D.; Chang, J.; Blaauw, D.; Svlvester, D. A 28NM integrated true random number generator harvesting entropy from MRAM. In Proceedings of the IEEE Symposium on VLSI Circuits, Honolulu, HI, USA, 18–22 June 2018. [Google Scholar]
- Park, S.; Choi, B.; Kang, T.; Park, K.; Lee, J.; Kang, S.; Kim, J. Analysis of entropy estimator of true random number generation using beta source. In Proceedings of the 34th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC), Bucharest, Romania, 23–26 June 2019. [Google Scholar]
- Cherkaoui, A.; Fischer, V.; Fesquet, L.; Aubert, A. A very high speed true random number generator with entropy assessment. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Santa Barbara, CA, USA, 19–22 December 2013. [Google Scholar]
- Chindris, G.; Suciu, A.; Muresan, M. High-entropy random number generators using system on chip devices. In Proceedings of the 31st International Spring Seminar on Electronics Technology, Budapest, Hungary, 7–11 May 2008. [Google Scholar]
- Lee, J.; Seo, Y.; Heo, J. Analysis of random number generated by quantum noise source and software entropy source. In Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 17–19 October 2018. [Google Scholar]
- Varchola, M.; Drutarovsky, M. New high entropy element for FPGA based true random number generators. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Santa Barbara, CA, USA, 17–20 August 2010. [Google Scholar]
- Zhou, T.; Zhou, Z.; Yu, M.; Ye, Y. Design of a low power high entropy chaos-based truly random number generator. In Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, Singapore, 4–7 December 2006. [Google Scholar]
- Liu, H.; Liu, W.; Lu, Z.; Tong, Q.; Liu, Z. Methods for estimating the convergence of inter-chip min-entropy of SRAM PUFs. IEEE Trans. Circuits Syst. Regul. Pap. 2017, 65, 593–605. [Google Scholar] [CrossRef]
- Wang, Q.; Qu, G. A silicon PUF based entropy pump. IEEE Trans. Dependable Secur. Comput. 2018, 16, 402–414. [Google Scholar] [CrossRef]
- Gu, C.; Liu, W.; Hanley, N.; Hesselbarth, R.; O’Neill, M. A theoretical model to link uniqueness and min-entropy for PUF evaluations. IEEE Trans. Comput. 2018, 68, 287–293. [Google Scholar] [CrossRef] [Green Version]
- Gu, C.; Hanley, N.; O’Neill, M. FPGA-based strong PUF with increased uniqueness and entropy properties. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, USA, 28–31 May 2017. [Google Scholar]
- Schaub, A.; Danger, J.-L.; Guilley, S.; Rioul, O. An improved analysis of reliability and entropy for delay PUFs. In Proceedings of the 21st Euromicro Conference on Digital System Design (DSD), Prague, Czech Republic, 29–31 August 2018. [Google Scholar]
- Koyily, A.; Zhou, C.; Kim, C.H.; Parhi, K.K. An entropy test for determining whether a MUX PUF is linear or nonlinear. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, USA, 28–31 May 2017. [Google Scholar]
- Wilde, F.; Frisch, C.; Pehl, M. Efficient bound for conditional min-entropy of physical unclonable functions beyond iid. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Delft, The Netherlands, 9–12 December 2019. [Google Scholar]
- Koeberl, P.; Li, J.; Rajan, A.; Wu, W. Entropy loss in PUF-based key generation schemes: The repetition code pitfall. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Arlington, VA, USA, 6–7 May 2014. [Google Scholar]
- Nagpal, S.; Kumar, S.; Gupta, S.C. A new method for modifying blowfish algorithm for iot. Comput. Secur. 1998, 8, 331–334. [Google Scholar]
- David, R.; Măluţan, R.; Borda, M. TLS protocol: Improving using ElGamal elliptic curves and one-time-pad. In Proceedings of the 11th International Symposium on Electronics and Telecommunications (ISETC), Timisoara, Romania, 14–15 November 2014. [Google Scholar]
- Zhang, X.; Wang, L.; Cui, G.; Niu, Y. Entropy-based block scrambling image encryption using DES structure and chaotic systems. Int. J. Opt. 2019, 2019, 3594534. [Google Scholar] [CrossRef] [Green Version]
- Perrin, L.; Khovratovich, D. Collision spectrum, entropy loss, T-sponges, and cryptanalysis of GLUON-64. In Proceedings of the International Workshop on Fast Software Encryption, London, UK, 3–5 March 2014. [Google Scholar]
- Leinweber, L.; Papachristou, C.; Wolff, F.G. An efficient elliptic curve cryptography processor using addition chains with high information entropy. In Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Montreal, QC, Canada, 29 April –2 May 2012. [Google Scholar]
- Hanaoka, G.; Hanaoka, Y.; Hagiwara, M.; Watanabe, H.; Imai, H. Unconditionally secure chaffing-and-winnowing: A relationship between encryption and authentication. In Proceedings of the International Symposium on Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes, Las Vegas, NV, USA, 20–24 February 2006. [Google Scholar]
- Brown, D.R. Formally assessing cryptographic entropy. Cryptol. Eprint Arch. 2011, 659, 1–98. [Google Scholar]
- Dawson, E.; Gustafson, H. A method for measuring entropy of symmetric cipher key generators. Comput. Secur. 1998, 17, 177–184. [Google Scholar] [CrossRef]
- Voronych, A.; Vozna, N.; Zastavnyy, O.; Pastukh, T.; Grynchyshyn, T. Multichannel system for structuring and transmission entropy-manipulated cipher signals. In Proceedings of the 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET), Slavske, Ukraine, 20–24 February 2018. [Google Scholar]
- Schulman, J.S. Entropy: An essential component of cryptographic security. J. Cybersecur. Aware. Educ. 2019, 1, 29–39. [Google Scholar]
- Al Jabri, A.K. The unicity distance: An upper bound on the probability of an eavesdropper successfully estimating the secret key. Inf. Process. Lett. 1996, 60, 43–47. [Google Scholar] [CrossRef]
- Dodis, Y.; Wichs, D. Non-malleable extractors and sym-metric key cryptography from weak secrets. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA, 31 May 2009. [Google Scholar]
- Dodis, Y.; Li, X.; Wooley, T.D.; Zuckerman, D. Privacy amplification and nonmalleable extractors via character sums. Siam J. Comput. 2014, 43, 800–830. [Google Scholar] [CrossRef] [Green Version]
- Cohen, G.; Raz, R.; Segev, G. Nonmalleable extractors with short seeds and applications to privacy amplification. In Proceedings of the IEEE 27th Conference on Computational Complexity, Porto, Portugal, 26–29 June 2012. [Google Scholar]
- Gur, T.; Shinkar, I. An entropy lower bound for non-malleable extractors. IEEE Trans. Inf. Theory 2019, 1. (in press). [Google Scholar] [CrossRef]
- Pliam, J.O. The Disparity between Work and Entropy in Cryptology. IACR Cryptol. Eprint Arch. 1998, 1998, 24. [Google Scholar]
- Christiansen, M.M.; Duffy, K.R. Guesswork, large deviations, and Shannon entropy. IEEE Trans. Inf. Theory 2012, 59, 796–802. [Google Scholar] [CrossRef] [Green Version]
- Pfister, C.E.; Sullivan, W.G. Renyi entropy, guesswork moments, and large deviations. IEEE Trans. Inf. Theory 2004, 50, 2794–2800. [Google Scholar] [CrossRef] [Green Version]
- Pliam, J.O. On the incomparability of entropy and marginal guesswork in brute-force attacks. In Proceedings of the INDOCRYPT 2000: Progress in Cryptology, Calcutta, India, 10–13 December 2000. [Google Scholar]
- Malone, D.; Sullivan, W. Guesswork is not a substitute for entropy. In Proceedings of the Irish Information Technology and Telecommunication conference, IT&T 2005, National Maritime College: Cork Institute of Technology, Dublin, Irland, 19 August 2005. [Google Scholar]
- Malone, D.; Sullivan, W.G. Guesswork and entropy. IEEE Trans. Inf. Theory 2004, 50, 525–526. [Google Scholar] [CrossRef]
- Lundin, R. Guesswork and Entropy as Security Measures for Selective Encryption. Ph.D. Thesis, Faculty of Economic Sciences, Communication and IT, Karlstad University, Karlstad, Sweden, 2012. [Google Scholar]
- Afifi, A. A chaotic confusion-diffusion image encryption based on Henon map. Int. J. Netw. Secur. Appl. (IJNSA) 2019, 11, 19–30. [Google Scholar]
- Som, S.; Kotal, A. Confusion and diffusion of grayscale images using multiple chaotic maps. In Proceedings of the National Conference on Computing and Communication Systems, Durgapur, India, 21–22 November 2012. [Google Scholar]
- Wu, X.; Wang, K.; Wang, X.; Kan, H. Lossless chaotic color image cryptosystem based on DNA encryption and entropy. Nonlinear Dyn. 2017, 90, 855–875. [Google Scholar] [CrossRef]
- Hayashi, M. Security analysis of ε-almost dual universal 2 hash functions: Smoothing of min entropy versus smoothing of Rényi entropy of order 2. IEEE Trans. Inf. Theory 2016, 62, 3451–3476. [Google Scholar] [CrossRef] [Green Version]
- Leiserson, C.E.; Schardl, T.B.; Sukha, J. Deterministic parallel random-number generation for dynamic-multithreading platforms. Acm Sigplan Not. 2012, 47, 193–204. [Google Scholar] [CrossRef] [Green Version]
- Bibak, K.; Kapron, B.M.; Srinivasan, V. MMH* with arbitrary modulus is always almost-universal. Inf. Process. Lett. 2016, 116, 481–483. [Google Scholar] [CrossRef]
- Bibak, K.; Kapron, B.M.; Srinivasan, V.; Tóth, L. On an almost-universal hash function family with applications to authentication and secrecy codes. Int. J. Found. Comput. Sci. 2018, 29, 357–375. [Google Scholar] [CrossRef]
- Bibak, K. Restricted Congruences in Computing; CRC Press: Boca Raton, FL, USA, 2020. [Google Scholar]
- Ritchie, R.; Bibak, K. SQUAREMIX: A faster pseudorandom number generator for dynamic-multithreading platforms. In Proceedings of the 2020 Data Compression Conference (DCC), Snowbird, UT, USA, 24–27 March 2020; p. 391. [Google Scholar]
- Ritchie, R.; Bibak, K. DOTMIX-Pro: Faster and more efficient variants of DOTMIX for dynamic-multithreading platforms. J. Supercomput. 2022, 78, 945–961. [Google Scholar] [CrossRef]
- Goldreich, O.; Sahai, A.; Vadhan, S. Can statistical zero knowledge be made non-interactive? or on the relationship of SZK and NISZK. In Proceedings of the CRYPTO ’99, Santa Barbara, CA, USA, 15–19 August 1999. [Google Scholar]
- Santis, A.D.; Crescenzo, G.D.; Persiano, G.; Yung, M. Image density is complete for non-interactive-SZK. In Proceedings of the 25th International Col-loquium on Automata, Languages and Programming, Aalborg, Denmark, 13–17 July 1998. [Google Scholar]
- Lovett, S.; Zhang, J. On the impossibility of entropy reversal, and itsapplication to zero-knowledge proofs. In Proceedings of the Theory of Cryptography Conference, Baltimore, MD, USA, 12–15 November 2017. [Google Scholar]
- Crépeau, C.; Kazmi, R.A. Zero-knowledge interactive proof systems for new lattice problems. In Proceedings of the IMA International Conference on Cryptography and Coding, Oxford, UK, 15–17 December 2015. [Google Scholar]
- Muchnik, A.; Romashchenko, A. A Random Oracle Does Not Help Extract the Mutual Information. In Proceedings of the International Symposium on Mathematical Foundations of Computer Science (MFCS 2008), Torun, Poland, 25–29 August 2008. [Google Scholar]
- Imai, H.; Hanaoka, G.; Shikata, J.; Otsuka, A.; Nascimento, A. Cryptography with information theoretic security. In Proceedings of the IEEE Information Theory Workshop, Bangalore, India, 25 October 2002. [Google Scholar]
- Iwamoto, M.; Ohta, K.; Shikata, J. Security formalizations and their relationships for encryption and key agreement in information-theoretic cryptography. IEEE Trans. Inf. Theory 2017, 64, 654–685. [Google Scholar] [CrossRef] [Green Version]
- Li, C.; Lin, D.; Feng, B.; Lü, J.; Hao, F. Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 2018, 6, 75834–75842. [Google Scholar] [CrossRef]
- Reeds, J. Entropy calculations and particular methods of cryptanalysis. Cryptologia 1977, 1, 235–254. [Google Scholar] [CrossRef]
- Su, X.; Li, W.; Hu, H. Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy. Multimed. Tools Appl. 2017, 76, 14021–14033. [Google Scholar] [CrossRef]
- Lyda, R.; Hamrock, J. Using entropy analysis to find encrypted and packed malware. IEEE Secur. Priv. 2007, 5, 40–45. [Google Scholar] [CrossRef]
- Alekseev, I.; Platonov, V. Detection of encrypted executable files based on entropy analysis to determine the randomness measure of byte sequences. Autom. Control. Comput. Sci. 2017, 51, 915–920. [Google Scholar] [CrossRef]
- Puteaux, P.; Puech, W. Noisy encrypted image correction based on Shannon entropy measurement in pixel blocks of very small size. In Proceedings of the EUSIPCO: European Signal Processing Conference, Rome, Italy, 3–7 September 2018. [Google Scholar]
- Lundin, R.; Lindskog, S. Entropy of selectively encrypted strings. In Proceedings of the 5th Workshop on Infor-mation Security Theory and Practices (WISTP), Heraklion, Crete, Greece, 1–3 June 2011. [Google Scholar]
- Chen, L.; Ju, S.; Zhou, C.; Zhang, Y. Covert channel capacity analysis based on entropy. In Proceedings of the International Symposium on Information Science and Engineering, Shanghai, China, 20–22 December 2008. [Google Scholar]
- Kiltz, E.; O’Neill, A.; Smith, A. Instantiability of RSA-OAEP under chosen-plaintext attack. J. Cryptol. 2017, 30, 889–919. [Google Scholar] [CrossRef] [Green Version]
- Bellare, M.; Rogaway, P. Optimal asymmetric encryption–how to encrypt with rsa (extended abstract). In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt), Perugia, Italy, 9–12 May 1994. [Google Scholar]
- Bard, G.V. A cahllenging but feasible blockwise-adaptive chosen-plaintext attac on ssl. In Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setúbal, Prtugal, 7–10 August 2006. [Google Scholar]
- Bard, G. Blockwise-adaptive chosen-plaintext attack and online modes of encryption. In Proceedings of the Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, 18–20 December 2007. [Google Scholar]
- Zhao, Y.; Liang, K.; Yang, B.; Chen, L. CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. Secur. Commun. Netw. 2019, 2019, 8357241. [Google Scholar] [CrossRef]
- Sun, S.F.; Gu, D.; Liu, S. Efficient chosen ciphertext secure identity-based encryption against key leakage attacks. Secur. Commun. Netw. 2016, 9, 1417–1434. [Google Scholar] [CrossRef]
- Zhou, Y.; Yang, B.; Yu, Y.; Khan, A. Efficient chosen-ciphertext secure hybrid encryption scheme tolerating continuous leakage attacks. J. Chin. Inst. Eng. 2019, 42, 39–47. [Google Scholar] [CrossRef]
- Prouff, E.; Rivain, M. Theoretical and practical aspects of mutual information based side channel analysis. Int. J. Appl. Cryptogr. 2010, 2, 121–138. [Google Scholar] [CrossRef]
- Dhavlle, A.; Bhat, S.; Rafatirad, S.; Homayoun, H.; Sai Manoj, P.D. Work-in-progress: Sequence-crafter: Side-channel entropy minimization to thwart timing-based side-channel attacks. In Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems (CASES), New York, NY, USA, 13–18 October 2019. [Google Scholar]
- Köpf, B.; Basin, D.A. An information-theoretic model for adaptive side-channel attacks. In Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 31 October–2 November 2007. [Google Scholar]
- Nassar, M.; Guilley, S.; Danger, J.-L. Formal analysis of the entropy/security trade-off in first-order masking countermeasures against side-channel attacks. In Proceedings of the International Conference on Cryptology in India (INDOCRYPT), Chennai, India, 11–14 August 2011. [Google Scholar]
- Liu, Y.; Das, R.K.; Li, H. Multi-band spectral entropy information for detection of replay attacks. In Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Lanzhou, China, 18–21 November 2019. [Google Scholar]
- Antonioli, D.; Tippenhauer, N.O.; Rasmussen, K. Key negotiation downgrade attacks on Bluetooth and Bluetooth low energy. ACM Trans. Priv. Secur. 2020, 23, 14:1–14:28. [Google Scholar] [CrossRef]
- Antonioli, D.; Tippenhauer, N.O.; Rasmussen, K.B. The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR. In Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, USA, 14–16 August 2019. [Google Scholar]
- Young, A.; Yung, M. Backdoor attacks on black-box ciphers exploiting low-entropy plaintexts. In Proceedings of the Australasian Conference on Information Security and Privacy, Wollongong, NSW, Australia, 9–11 July 2003. [Google Scholar]
- Nam, J.; Choo, K.-K.R.; Paik, J.; Won, D. An offline dictionary attack against a three-party key exchange protocol. IEEE Commun. Lett. 2009, 13, 205–207. [Google Scholar]
- Abdalla, M.; Pointcheval, D. Simple password-based encrypted keyexchange protocols. In Proceedings of the RSA Conference, San Francisco, CA, USA, 14–18 February 2005. [Google Scholar]
- Hromada, V.; Öllős, L.; Zajac, P. Using SAT solvers in large scale distributed algebraic attacks against low entropy keys. Tatra Mt. Math. Publ. 2015, 64, 187–203. [Google Scholar] [CrossRef] [Green Version]
- Rock, A. Collision attacks based on the entropy loss caused by random functions. In Proceedings of the Second Western European Workshop on Research in Cryptology (WEWoRC), Bochum, Germany, 4–6 July 2007. [Google Scholar]
- Wiemers, A.; Klein, D. Entropy reduction for the correlation-enhanced power analysis collision attack. In Proceedings of the International Workshop on Security, Sendai, Japan, 3–5 September 2018. [Google Scholar]
- Moradi, A.; Mischke, O.; Eisenbarth, T. Correlation-enhanced power analysis collision attack. In Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, Santa Barbara, CA, USA, 17–20 August 2010. [Google Scholar]
- Rohani, N.; Noferesti, Z.; Mohajeri, J.; Aref, M.R. Guess and Determine Attack on Bivium. J. Inf. Process. Syst. 2011, 7, 151–158. [Google Scholar] [CrossRef] [Green Version]
- Soder, N.; Deluca, C.; Biersach, D.; DePhillips, M. Assessing the Cryptographic Strength of RSA Moduli Using Algorithmic Entropy Reduction in Bivariate Polynomials. In Proceedings of the New York Scientific Data Summit (NYSDS), New York, NY, USA, 6–8 August 2018. [Google Scholar]
- Lashermes, R.; Reymond, G.; Dutertre, J.-M.; Fournier, J.; Robisson, B.; Tria, A. A DFA on AES based on the entropy of error distributions. In Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography, (A DFA on AES Based on the Entropy of Error Distributions), Leuven, Belgium, 9 September 2012. [Google Scholar]
- Patil, P.; Narayankar, P.; Narayan, D.; Meena, S.M. A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. In Proceedings of the International Conference on Information Security & Privacy (ICISP2015), ESEO, Angers, Loire Valley, France, 11–12 February 2015. [Google Scholar]
- Babbage, S.; Lano, J. Probabilistic factors in the sober-t stream ciphers. In Proceedings of the 3rd New European Schemes for Signatures, Integrity, and Encryption (NESSIE Workshop), Munich, Germany, 6–7 November 2002. [Google Scholar]
- Bienfang, J.; Mink, A.; Hershman, B.; Nakassis, A.; Tang, X.; Boisvert, R.; Su, D.; Clark, C.W.; Williams, C.J.; Gross, A. Broadband quantum generated one-time-pad encryption. In Proceedings of the Quantum Electronics and Laser Science Conference, Shanghai, China, 22–27 December 2005. [Google Scholar]
- Bienfang, J.; Mink, A.; Hershman, B.; Nakassis, A.; Tang, X.; Boisvert, R.; Su, D.; Clark, C.W.; Williams, C.J.; Gross, A. Quantum generated one-time-pad encryption with 1.25 Gbps clock synchronization. In Proceedings of the OFC/NFOEC Technical Digest. Optical Fiber Communication Conference, Anaheim, CA, USA, 7–10 March 2005. [Google Scholar]
- Arnon-Friedman, R.; Dupuis, F.; Fawzi, O.; Renner, R.; Vidick, T. Practical device-independent quantum cryptography via entropy accumulation. Nat. Commun. 2018, 9, 459. [Google Scholar] [CrossRef] [Green Version]
- Chen, Z.; Zhang, Y.; Wang, X.; Yu, S.; Guo, H. Improving parameter estimation of entropic uncertainty relation in continuous-variable quantum key distribution. Entropy 2019, 21, 652. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Myers, J.M.; Wu, T.T.; Pearson, D.S. Entropy estimates for individual attacks on the BB84 protocol for quantum key distribution. In Proceedings of the Fourth IMA Conference on Cryptography and Coding, Orlando, FL, USA, 24 August 2004. [Google Scholar]
- Kowalczyk, L.; Lewko, A.B. Bilinear entropy expansion from the decisional linear assumption. In Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2015. [Google Scholar]
- Impagliazzo, R.; Luby, M. One-way functions are essential for complexity based cryptography. In Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, NC, USA, 30 October–1 November 1989. [Google Scholar]
- Haitner, I.; Vadhan, S. Tutorials on the Foundations of Cryptography; The Many Entropies in One-Way Functions; Springer: Berlin, Germany, 2017; pp. 159–217. [Google Scholar]
- Boakye-Boateng, K.; Kuada, E.; Antwi-Boasiako, E.; Djaba, E. Encryption protocol for resource-constrained devices in fog-based IoT using one-time pads. IEEE Internet Things J. 2019, 6, 3925–3933. [Google Scholar] [CrossRef]
- Vassilev, A.; Staples, R. Entropy as a service: Unlocking cryptography’s full potential. Computer 2016, 49, 98–102. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Pierrot, C.; Wesolowski, B. Malleability of the blockchain’s entropy. Cryptogr. Commun. 2018, 10, 211–233. [Google Scholar] [CrossRef] [Green Version]
- Tang, H.; Shi, Y.; Dong, P. Public blockchain evaluation using entropy and TOPSIS. Expert Syst. Appl. 2019, 117, 204–210. [Google Scholar] [CrossRef]
- Wu, K.; Peng, B.; Xie, H.; Huang, Z. An information entropy method to quantify the degrees of decentralization for blockchain systems. In Proceedings of the IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, China, 12–14 July 2019. [Google Scholar]
- Giacobazzi, R.; Toppan, A. On entropy measures for code obfuscation. In Proceedings of the Software Security and Protection Workshop, Orlando, FL, USA, 16 June 2012. [Google Scholar]
- Cheng, C.; Jiang, T.; Zhang, Q. TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding. IEEE J. Sel. Areas Commun. 2013, 31, 291–298. [Google Scholar] [CrossRef]
- Leurent, G.; Peyrin, T.; Wang, L. New generic attacks against hash-based MACs. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, 1–5 December 2013. [Google Scholar]
- Bowen, G.; Datta, N. Beyond i.i.d. in quantum information theory. In Proceedings of the IEEE International Symposium on Information Theory, Seattle, WA, USA, 10 July 2006. [Google Scholar]
- Watanabe, S.; Hayashi, M. Non-asymptotic analysis of privacy amplification via rényi entropy and inf-spectral entropy. In Proceedings of the IEEE International Symposium on Information Theory, Istanbul, Turkey, 7–12 July 2013. [Google Scholar]
- Yao, Y. A generalized constraint of privacy: A-mutual information security. IEEE Access 2019, 7, 36122–36131. [Google Scholar] [CrossRef]
- Wang, Y.; Huang, Z.; Mitra, S.; Dullerud, G.E. Differential privacy in linear distributed control systems: Entropy minimizing mechanisms and performance tradeoffs. IEEE Trans. Control. Netw. Syst. 2017, 4, 118–130. [Google Scholar] [CrossRef]
- Ryabko, B.; Ryabko, D. Information-theoretic approach to steganographic systems. In Proceedings of the IEEE International Symposium on Information Theory, Nice, France, 24–29 June 2007. [Google Scholar]
- Hu, X.; Ni, J.; Shi, Y.-Q. Efficient JPEG steganography using domain transformation of embedding entropy. IEEE Signal Process. Lett. 2018, 25, 773–777. [Google Scholar] [CrossRef]
- Kim, C.; Lee, S.; Lee, J.; Park, J.-I. Blind decoding of image steganography using entropy model. Electron. Lett. 2018, 54, 626–628. [Google Scholar] [CrossRef]
- Zheng, L.; Cox, I.J. Jpeg based conditional entropy coding for correlated steganography. In Proceedings of the IEEE International Conference on Multimedia and Expo, Beijing, China, 2–5 July 2007. [Google Scholar]
- Roy, R.; Changder, S. Image steganography with block entropy based segmentation and variable rate embedding. In Proceedings of the 2nd International Conference on Business and Information Management (ICBIM), Durgapur, India, 9–11 January 2014. [Google Scholar]
- Malik, H.; Subbalakshmi, K.; Chandramouli, R. Nonparametric steganalysis of qim steganography using approximate entropy. IEEE Trans. Inf. Forensics Secur. 2011, 7, 418–431. [Google Scholar] [CrossRef] [Green Version]
- Kim, J.H.; Kim, M.Y.; Youm, H.Y. Trust Elevation Scheme Based on Entropy-Specific Biometric Authentication Methods for the Financial Sector. In Proceedings of the 13th Asia Joint Conference on Information Security (AsiaJCIS), Guilin, China, 8–9 August 2018. [Google Scholar]
- Nemavarkar, A.; Chakrawarti, R.K. A uniform approach for multilevel email security using image authentication, compression, otp & cryptography. In Proceedings of the International Conference on Computer, Communication and Control (IC4), Indore, India, 10–12 December 2015. [Google Scholar]
- Mu, Z.; Hu, J.; Min, J.; Yin, J. Comparison of different entropies as features for person authentication based on EEG signals. IET Biom. 2017, 6, 409–417. [Google Scholar] [CrossRef]
- Atighehchi, K.; Barbier, M. Signature renewal for low entropy data. In Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018. [Google Scholar]
- Kumar, R.; Verma, H.K.; Dhir, R. Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers. Math. Probl. Eng. 2013, 2013, 790257. [Google Scholar] [CrossRef]
- Rückert, M. Lattice-based blind signatures. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 5–9 December 2010. [Google Scholar]
- Dent, A.W.; Fischlin, M.; Manulis, M.; Stam, M.; Schröder, D. Confidential signatures and deterministic signcryption. In Proceedings of the International Workshop on Public Key Cryptography, Paris, France, 26–28 May 2010. [Google Scholar]
- Zou, S.; Liang, Y.; Lai, L.; Shamai, S. An information theoretic approach to secret sharing. In Proceedings of the IEEE International Symposium on Informa-tion Theory (ISIT), Saint Petersburg, Russia, 31 July–5 August 2011. [Google Scholar]
- Zhao, Q.; Zheng, W.; Zhao, X.; Cao, Y.; Zhang, F.; Law, M.-K. A 108 F2/bit fully reconfigurable RRAM PUF based on truly random dynamic entropy of jitter noise. IEEE Trans. Circuits Syst. 2020, 67, 3866–3879. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zolfaghari, B.; Bibak, K.; Koshiba, T. The Odyssey of Entropy: Cryptography. Entropy 2022, 24, 266. https://doi.org/10.3390/e24020266
Zolfaghari B, Bibak K, Koshiba T. The Odyssey of Entropy: Cryptography. Entropy. 2022; 24(2):266. https://doi.org/10.3390/e24020266
Chicago/Turabian StyleZolfaghari, Behrouz, Khodakhast Bibak, and Takeshi Koshiba. 2022. "The Odyssey of Entropy: Cryptography" Entropy 24, no. 2: 266. https://doi.org/10.3390/e24020266