Fig.1 Perfect secrecy of one-time pad
3. Analysis on the proof
The proof is based on information theory, so we should analysis the
problem from the view of information theory. It can be seen from
Shannon's formula and proof that the conditional entropy is gained
from fixed joint probability distributions. The above proof confuses
the probabilities and entropies under different conditions like other
proofs about the perfect secrecy of OPT. As we have pointed out in OTP
there were complex and crytic conditions that influenced the
probability of plaintext, key and ciphertext. The proof did not
realize the crytic condition that ciphertext was a fixed value (even
though unknown) rather than a random variable. One would think it is
not necessary to take that ciphertext was a fixed value (even though
unknown) as a condition. We can see that by the following analysis. In
OPT, when considering the case of encryption, the ciphertext is a
random variable, in that case, the number of the possible values of
cipher is infinite. It is very complex to deal with the probability
distribution and the entropy of ciphertext, but if we set the possible
value of ciphertext as a fixed(certain) value, then the number of the
possible values is finite. When considering the case of intercepting
the ciphertext, the ciphertext is a fixed value, so it is very proper
to set the ciphertext as fixed value. We illustrate to show the
condition that ciphertext is a fixed value influences the probability
distributions of plaintext and key and thus influences the entropies:
The plaintext space, ciphertext space and key space of OPT are all (0,
1) with the keys being equally likely. It is known beforehand that the
prior probability P(M=0)= 0.9 and P(M=1)= 0.1. If we consider the
ciphertext is fixed(even though unkown), there is a one-to-one
correspondence between all the plaintexts and keys, so the
probabilities of the corresponding plaintext and key are the same. As
all the keys are equally likely, so all the plaintexts are equally
likely, that is, the probability of plaintext being 1 is 0.5 under
that condition. As the probability distribution obtained above isn't
consistent with the prior probability distribution, when the above
condition and the prior probability are both considered, the final
probability distribution of plaintext should be a compromise of the
two and unequal to the prior probability distribution. It is similar
to the probability distribution of key when ciphertext as a fixed
value is considered. The probabilities of plaintexts change when the
cipher as a fixed value(even though unkown) is considered, and it is
the same when ciphertext is intercepted, thus OPT is not perfectly
secure as perfect secrecy implies that the posterior probability and
the prior probability of plaintext are the same.
The above proof is correct before the conclusion that OPT is perfect
secrecy is gained if all values such as the entropies, condition
entropies and the joint probability distributions are under the same
case, but we can find that the values relatived to M is under the case
of encryption, that is, the case that ciphertext is not fixed and the
values relatived to C is obviously under the case of decryption, that
is, the case that ciphertext is intercepted and fixed, for only under
that case can I(M ; C) = 0 ensure that OPT is perfectly secure. All
the values in Fig.1 should be under the same case and the same joint
probability distributions. But in the proof, the values are not under
the same case, the covert condition that ciphertext is fixed is
sometimes unconsciously considered and sometimes ignored. That results
in confusion and mistake.
Maybe someone would take the prior probability as the probability
under the consideration that ciphertext is fixed, but we can find from
the proofs about the perfect secrecy of OPT and background that it is
not the view of Shannon. Detailed analysis was given in literature
[8]. The proof analyzed in literature [9] also shows it is not the
view of cryptographists and cryptographic community.
4. Conclusion
This paper gives analysis on the mistake in information-theoric proof
and confirms OPT is not perfect secure. The mistake similar to other
proofs lies in the confusion of the different conditions as the same.
Though OPT is not perfectly secure and not completely unimpeachable,
it still has a lot of good statistical properties and can be used in
cases of superior security. The similar problems may exist in the
applications of information theory.
Reference
[1]. Bruce Schneier, Applied Cryptography Second Edition: protocols,
algorithms, and source code in C[M],John Wiley &Sons,Inc,1996
[2]. C.E.Shannon, Communication Theory of Secrecy Systems [J], Bell
System Technical journal, v.28, n.4, 1949, 656-715.
[3]. Yong WANG, Security of One-time System and New Secure System [J],
Netinfo Security, 2004, (7):41-43
[4]. Yong WANG, Fanglai ZHU, Reconsideration of Perfect Secrecy,
Computer Engineering, 2007, 33(19)
[5]. Yong WANG, Perfect Secrecy and Its Implement [J],Network &
Computer Security,2005(05)
[6]. Yong WANG, Fanglai ZHU, Security Analysis of One-time System and
Its Betterment, Journal of Sichuan University (Engineering Science
Edition), 2007, supp. 39(5):222-225
[7]. Yong WANG, Shengyuan Zhou, On Probability Attack, Information
Security and Communications Privacy, 2007,(8):39-40
[8]. Yong WANG, Confirmation of Shannon's Mistake about Perfect
Secrecy of One-time-pad, http://arxiv.org/abs/0709.4420.
[9]. Yong WANG, Mistake Analyses on Proof about Perfect Secrecy of One-
time-pad, http://arxiv.org/abs/0709.3334
That's not 'literature', that's just more of your own rambling.
Phil
--
Dear aunt, let's set so double the killer delete select all.
-- Microsoft voice recognition live demonstration
That's not 'literature', that's just more of your own rambling.
--------------no other people doubt OPT ecept me.
Point of clarification. Does this mean "I am the only person who
doubts the OTP" or does it mean "I am just one of a number of people
who doubt the OTP". As written it could mean either depending on
whether your initial "no" refers to Phil's post or to "other people".
rossum
Yes, yes, the whole world's mad, and you're the only sane one.
Good luck with your OPTs.
Wheeeeee....
What's that sound?
*PLONK*
Ah, that's the sound of you landing at the bottom of the killfile.
Wheeeeee....
What's that sound?
*PLONK*
Ah, that's the sound of you landing at the bottom of the killfile.
Phil
-----------------------you are unreasonable.
If I am right, what can you do?
If you are right, you can accept my offer to help you
demonstrate a weakness in the One-Time Pad, said offer made
Sun, 21 Oct 2007 18:20:45 -0000
in post <13hn63t...@news.supernews.com>.
Sci.crypt occasionally gets posts from people who claim to
have discovered wonderful ways to factor huge numbers, but
who never actually factor huge numbers. If you don't
want to be classified as that kind of nut case, you need
to change your strategy.
--
To email me, substitute nowhere->spamcop, invalid->net.
-----------you can introduce yourself.
My paper is not windbaggary, there is analysis about the mistake.
What can you help me?
[excertping from a previous post from me:]
> If you are right, you can accept my offer to help you
> demonstrate a weakness in the One-Time Pad, said offer made
[then proceeding:]
>
> -----------you can introduce yourself.
> My paper is not windbaggary, there is analysis about the mistake.
Maybe. But every crackpot inventor of a magical
factorization algorithm similarly insists on discussing his
algorithm, rather than demonstrating it. The fact that he
wants the community to spend a huge amount of their time on
the difficult job of proof-reading his opaque ramblings,
rather than spending his own time to produce a simple
demonstration, suggests either a poor sense of economics or
a lack of confidence in his supposed results.
> What can you help me?
Why did you cut off the part of my previous post in which
I identified the message containing the specifics of my offer?
If you can't take the time to consider and respond to that
offer, then I can do nothing to help you.
[then proceeding:]
> -----------you can introduce yourself.
> My paper is not windbaggary, there is analysis about the mistake.
Maybe. But every crackpot inventor of a magical
factorization algorithm similarly insists on discussing his
algorithm, rather than demonstrating it. The fact that he
wants the community to spend a huge amount of their time on
the difficult job of proof-reading his opaque ramblings,
rather than spending his own time to produce a simple
demonstration, suggests either a poor sense of economics or
a lack of confidence in his supposed results.
---your suggestion? It is not so hard to understand my analysis.
> What can you help me?
Why did you cut off the part of my previous post in which
I identified the message containing the specifics of my offer?
If you can't take the time to consider and respond to that
offer, then I can do nothing to help you.
-----------------------you avoid the answer and seem windbaggary, I
just ask you what to see whether you are windbaggary. If i am wrong, I
would not need your help.
--