RO  EN
IMCS/Publications/CSJM/Issues/CSJM v.24, n.1 (70), 2016/

Stream Deniable-Encryption Algorithms

Authors: N. A. Moldovyan, A. A. Moldovyan, D. N. Moldovyan, Şcerbacov Victor
Keywords: cryptology, algorithm, stream, deniable, encryption.

Abstract

A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher. One of the key streams is generated depending on the secret key and the other one is generated depending on the fake key. The key streams are mixed with the secret and fake data streams so that the output ciphertext looks like the ciphertext produced by some probabilistic encryption algorithm applied to the fake message, while using the fake key. When the receiver or/and sender of the ciphertext are coerced to open the encryption key and the source message, they open the fake key and the fake message. To disclose their lie the coercer should demonstrate possibility of the alternative decryption of the ciphertext, however this is a computationally hard problem.

N. A. Moldovyan1, A. A. Moldovyan$2, D. N. Moldovyan3, V. A. Shcherbacov4

1 Professor, St. Petersburg Institute for Informatics and Automation of
Russian Academy of Sciences
14 Liniya, 39, St.Petersburg, 199178
Russia
E-mail:

2 Professor, ITMO University
Kronverksky pr., 10, St.Petersburg, 197101
Russia
E-mail:

3 Dr., St. Petersburg Institute for Informatics and Automation of
Russian Academy of Sciences
14 Liniya, 39, St.Petersburg, 199178
Russia
E-mail:

4 Dr., Institute of Mathematics and Computer Science
Academy of Sciences of Moldova
Academiei str. 5, MD-2028 Chisinau
Moldova
E-mail:

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Fulltext

Adobe PDF document0.12 Mb