Skip to main navigation Skip to search Skip to main content

Ambiguous Multi-Symmetric Cryptography

  • Richard Bassous
  • , Roger Bassous
  • , Huirong Fu
  • , Ye Zhu
  • Oakland University

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

In this paper, we propose a new method called Ambiguous Multi-Symmetric Cryptography (AMSC) that conceals multiple plain-texts in a cipher-text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed. The proposed method AMSC is a cryptographic primitive that preserves plausible deniability after a cryptographic key is discovered. We evaluate AMSC in terms of security and complexity. The security analysis shows that our scheme withstands all security attack models with different knowledge of the adversary. In terms of time complexity, AMSC produces the cipher-text in polynomial time with respect to the number and size of the plaintexts and keys. AMSC has two main applications: a) It sends multiple messages for multiple receivers through one cipher-text. b) It sends one real message and multiple decoys to defeat attacks by providing security beyond conventional brute-force bounds. For both applications, AMSC can be used to deny encryption.
Original languageEnglish
Title of host publicationIEEE International Conference on Communications
Place of Publicationusa
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages7394-7399
Number of pages6
Volume2015-September
ISBN (Electronic)9781467364324
DOIs
StatePublished - Sep 9 2015
EventIEEE International Conference on Communications, ICC 2015 - London, United Kingdom
Duration: Jun 8 2015Jun 12 2015

Conference

ConferenceIEEE International Conference on Communications, ICC 2015
Country/TerritoryUnited Kingdom
CityLondon
Period06/8/1506/12/15

Keywords

  • Ambiguous encryption
  • Brute force attack
  • Cipher-text only attack
  • Crack symmetric
  • Deniable encryption
  • Honey encryption
  • Multi encryption
  • Symmetric cryptography

Cite this