ebook img

Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach (Signals and Communication Technology) PDF

121 Pages·2022·3.12 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach (Signals and Communication Technology)

Signals and Communication Technology SeriesEditors Emre Celebi, Department of Computer Science, University of Central Arkansas, Conway,AR,USA JingdongChen,NorthwesternPolytechnicalUniversity,Xi’an,China E. S. Gopi, Department of Electronics and Communication Engineering, National InstituteofTechnology,Tiruchirappalli,TamilNadu,India AmyNeustein,LinguisticTechnologySystems,FortLee,NJ,USA H. Vincent Poor, Department of Electrical Engineering, Princeton University, Princeton,NJ,USA AntonioLiotta,UniversityofBolzano,Bolzano,Italy MarioDiMauro,UniversityofSalerno,Salerno,Italy This series is devoted to fundamentals and applications of modern methods of signal processing and cutting-edge communication technologies. The main topics are information and signal theory, acoustical signal processing, image processing and multimedia systems, mobile and wireless communications, and computer and communication networks. Volumes in the series address researchers in academia and industrial R&D departments. The series is application-oriented. The level of presentation of each individual volume, however, depends on the subject and can rangefrompracticaltoscientific. Indexing: All books in “Signals and Communication Technology” are indexed byScopusandzbMATH Forgeneralinformationaboutthisbookseries,commentsorsuggestions,please contact Mary James at [email protected] or Ramesh Nath Premnath at [email protected]. Behrouz Zolfaghari (cid:129) Khodakhast Bibak Perfect Secrecy in IoT A Hybrid Combinatorial-Boolean Approach BehrouzZolfaghari KhodakhastBibak CyberScienceLab,SchoolofComputer MiamiUniversity Science Oxford,OH,USA UniversityofGuelph Guelph,ON,Canada ISSN1860-4862 ISSN1860-4870 (electronic) SignalsandCommunicationTechnology ISBN978-3-031-13190-5 ISBN978-3-031-13191-2 (eBook) https://doi.org/10.1007/978-3-031-13191-2 ©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicensetoSpringerNatureSwitzerland AG2022 Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar ordissimilarmethodologynowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Iwouldliketodedicatethisbooktomy belovedwifeSaeidehforallherpatienceand herkindsupport. Preface Perfectlysecurecryptographyisabranchofinformation-theoreticcryptography.A perfectlysecurecryptosystemguaranteesthatthemaliciousthirdpartycannotguess anything regarding the plain text or the key, even in the case of full access to the ciphertext.Despitethisadvantage,thereareonlyafewreal-worldimplementations ofperfectsecrecyduetosomewell-knownlimitations.Anysimple,straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This booktakesonesteptowardsthisgoalviapresentingahybridcombinatorial-Boolean modelforperfectlysecurecryptographyinIoT. In this book, we first present an introduction to information-theoretic cryp- tography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergencepointforexistingtrendsinresearchoncryptographyinIoT.Thenwe investigate combinatorial and Boolean cryptography and show how they are seen almosteverywhereintheecosystemandthelifecycleofinformation-theoreticIoT cryptography.WefinallymodelperfectsecrecyinIoTusingBooleanfunctions,and maptheBooleanfunctionstosimple,well-studiedcombinatorialdesignslikeLatin squares. Thisbookisorganizedintwoparts.Thefirstpartstudiesinformation-theoretic cryptography and the promise it holds for cryptography in IoT. The second part separately discusses combinatorial and Boolean cryptography, and then presents vii viii Preface Fig.1 Theorganizationofthebookalongwiththepurposeofeachpartandeachchapter the hybrid combinatorial-Boolean model for perfect secrecy in IoT. Figure 1 illustratestheorganizationofthisbookalongwiththepurposeofeachpartandeach chapter. Guelph,ON,Canada BehrouzZolfaghari Acknowledgements We would like to thank Professor Subhamoy Maitra (Indian Statistical Institute, Kolkata)forhishelpinthedevelopmentoftheideasbehindtheapproachproposed inthisbook. ix Contents PartI Information-TheoreticCryptographyandPerfectSecrecy 1 Information-TheoreticCryptographyandPerfectSecrecy............. 3 1.1 Introduction ............................................................. 3 1.2 Entropy:FromThermodynamicstoInformationTheory ............. 4 1.3 Information Theory: Everywhere in the Ecosystem of Cryptography ........................................................... 5 1.4 PerfectSecrecy ......................................................... 6 1.4.1 Notions ......................................................... 7 1.4.2 Approaches ..................................................... 7 1.4.3 Variants ......................................................... 7 1.4.4 ApplicationsinCryptography ................................. 8 1.5 One-Time Pad (OTP): The Only Real-World Implementation ......................................................... 9 1.5.1 TheEcosystemofOTPCryptography ........................ 10 1.5.2 TheRoleofOTPintheFutureofCryptography ............. 11 2 Information-TheoreticCryptography:AManeuverinthe Trade-OffSpaceofCryptographyinIoT ................................. 15 2.1 IntroductionandBasicConcepts ...................................... 15 2.2 Real-TimeCryptography ............................................... 16 2.2.1 Ecosystem ...................................................... 16 2.3 Resource-ConstrainedCryptography .................................. 19 2.3.1 EmbeddedCryptography ...................................... 19 2.3.2 LightweightCryptography ..................................... 21 2.4 CryptographyinIoT .................................................... 23 2.4.1 Ecosystem ...................................................... 23 2.4.2 Real-TimeCryptographyinIoT ............................... 25 xi

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.