Issue |
Security and Safety
Volume 2, 2023
|
|
---|---|---|
Article Number | 2023004 | |
Number of page(s) | 16 | |
Section | Information Network | |
DOI | https://doi.org/10.1051/sands/2023004 | |
Published online | 06 July 2023 |
Views
From perfect secrecy to perfect safety & security: Cryptography-based analysis of endogenous security
1
PLA Strategic Support Force Information Engineering University, Zhengzhou, 450002, China
2
Purple Mountain Laboratories: Networking, Communications and Security, Nanjing, 211111, China
* Corresponding authors (email: ndscpls@163.com)
Received:
16
December
2022
Revised:
6
March
2023
Accepted:
10
April
2023
In this paper, we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge. To prove the conjecture, we first establish a cryptography model of instinct function security to transform the security problem in the network domain into an encryption problem in the cryptographic domain. Then, we inherit and apply the established ideas and means of Perfect Secrecy, and propose the concept, definition and corollaries of the perfect instinct function security (PIFS) corresponding to Perfect Secrecy. Furthermore, we take the DHR system as a concrete implementation of PIFS and propose the DHR Perfect Security Theorem corresponding to Shannon’s Perfect Secrecy Theorem. Finally, we prove that the DHR satisfying the “One-Time Reconstruction” constraint is the sufficient and necessary condition to achieve perfect security. This means that the existence of PIFS is also proven. The analysis shows that any reconfigurable system can be encrypted by its construct and that the PIFS converts the one-way transparent superiority of the attacker into a double-blind problem for both the attacker and the defender, which leads to that the attacker is impossible to obtain useful construction information from the attacks and unable to find a better way than blind trial-and-error or brute-force attacks. Since the attackers are required to have the new powerful ability to crack the structure cryptogram, the threshold of cyber security is raised to at least the same level as cryptogram deciphering, thereafter the ubiquitous cyber threats are destined to be significantly reduced.
Key words: perfect instinct function security / perfect secrecy / DHR / endogenous security / One-Time Reconstruction / generalized safety and security / perfect security
Citation: Jin L, Hu XY and Wu JX. From perfect secrecy to perfect safety & security: Cryptography-based analysis of endogenous security. Security and Safety 2023; 2: 2023004. https://doi.org/10.1051/sands/2023004
© The Author(s) 2023. Published by EDP Sciences and China Science Publishing & Media Ltd.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.