One key for each task 2 – A Secret to Share

Frequently changing keys also limits the exposure time of a key compromised by Mallory. If the extracted key is used only for a single communication session, Mallory cannot decrypt previous sessions and needs to repeat the extraction (and hope that her malware won’t be detected by Alice’s virus scanners, firewalls, and intrusion detection systems) to […]

True randomness and pseudo-randomness – A Secret to Share

3.7.3 True randomness and pseudo-randomness Modern algorithms such as Yarrow [99] or Fortuna (see chapter 10 of [65]) generate secret keys for use in cryptographic algorithms and protocols by accumulating entropy from several True Random Number Generators (TRNGs) and combining it using hash functions (see Chapter 11, Hash Functions and Message Authentication Codes) and block […]

Information-theoretical security (perfect secrecy) – Encryption and Decryption

4.3 Information-theoretical security (perfect secrecy) The historical roots of encryption are in military and diplomatic communications. The first encryption schemes were perhaps invented by the ancient Greeks and Romans. These encryption schemes have survived until today in the form of examples for easily breakable ciphers and can be found in virtually any textbook on cryptography. […]