Table Of ContentSignals and Communication Technology
SeriesEditors
Emre Celebi, Department of Computer Science, University of Central Arkansas,
Conway,AR,USA
JingdongChen,NorthwesternPolytechnicalUniversity,Xi’an,China
E. S. Gopi, Department of Electronics and Communication Engineering, National
InstituteofTechnology,Tiruchirappalli,TamilNadu,India
AmyNeustein,LinguisticTechnologySystems,FortLee,NJ,USA
H. Vincent Poor, Department of Electrical Engineering, Princeton University,
Princeton,NJ,USA
AntonioLiotta,UniversityofBolzano,Bolzano,Italy
MarioDiMauro,UniversityofSalerno,Salerno,Italy
This series is devoted to fundamentals and applications of modern methods of
signal processing and cutting-edge communication technologies. The main topics
are information and signal theory, acoustical signal processing, image processing
and multimedia systems, mobile and wireless communications, and computer and
communication networks. Volumes in the series address researchers in academia
and industrial R&D departments. The series is application-oriented. The level of
presentation of each individual volume, however, depends on the subject and can
rangefrompracticaltoscientific.
Indexing: All books in “Signals and Communication Technology” are indexed
byScopusandzbMATH
Forgeneralinformationaboutthisbookseries,commentsorsuggestions,please
contact Mary James at [email protected] or Ramesh Nath Premnath at
[email protected].
Behrouz Zolfaghari (cid:129) Khodakhast Bibak
Perfect Secrecy in IoT
A Hybrid Combinatorial-Boolean Approach
BehrouzZolfaghari KhodakhastBibak
CyberScienceLab,SchoolofComputer MiamiUniversity
Science Oxford,OH,USA
UniversityofGuelph
Guelph,ON,Canada
ISSN1860-4862 ISSN1860-4870 (electronic)
SignalsandCommunicationTechnology
ISBN978-3-031-13190-5 ISBN978-3-031-13191-2 (eBook)
https://doi.org/10.1007/978-3-031-13191-2
©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicensetoSpringerNatureSwitzerland
AG2022
Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether
thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse
ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and
transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar
ordissimilarmethodologynowknownorhereafterdeveloped.
Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication
doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant
protectivelawsandregulationsandthereforefreeforgeneraluse.
Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook
arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor
theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany
errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional
claimsinpublishedmapsandinstitutionalaffiliations.
ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG
Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland
Iwouldliketodedicatethisbooktomy
belovedwifeSaeidehforallherpatienceand
herkindsupport.
Preface
Perfectlysecurecryptographyisabranchofinformation-theoreticcryptography.A
perfectlysecurecryptosystemguaranteesthatthemaliciousthirdpartycannotguess
anything regarding the plain text or the key, even in the case of full access to the
ciphertext.Despitethisadvantage,thereareonlyafewreal-worldimplementations
ofperfectsecrecyduetosomewell-knownlimitations.Anysimple,straightforward
modeling can pave the way for further advancements in the implementation,
especially in environments with time and resource constraints such as IoT. This
booktakesonesteptowardsthisgoalviapresentingahybridcombinatorial-Boolean
modelforperfectlysecurecryptographyinIoT.
In this book, we first present an introduction to information-theoretic cryp-
tography as well as perfect secrecy and its real-world implementations. Then we
take a systematic approach to highlight information-theoretic cryptography as a
convergencepointforexistingtrendsinresearchoncryptographyinIoT.Thenwe
investigate combinatorial and Boolean cryptography and show how they are seen
almosteverywhereintheecosystemandthelifecycleofinformation-theoreticIoT
cryptography.WefinallymodelperfectsecrecyinIoTusingBooleanfunctions,and
maptheBooleanfunctionstosimple,well-studiedcombinatorialdesignslikeLatin
squares.
Thisbookisorganizedintwoparts.Thefirstpartstudiesinformation-theoretic
cryptography and the promise it holds for cryptography in IoT. The second part
separately discusses combinatorial and Boolean cryptography, and then presents
vii
viii Preface
Fig.1 Theorganizationofthebookalongwiththepurposeofeachpartandeachchapter
the hybrid combinatorial-Boolean model for perfect secrecy in IoT. Figure 1
illustratestheorganizationofthisbookalongwiththepurposeofeachpartandeach
chapter.
Guelph,ON,Canada BehrouzZolfaghari
Acknowledgements
We would like to thank Professor Subhamoy Maitra (Indian Statistical Institute,
Kolkata)forhishelpinthedevelopmentoftheideasbehindtheapproachproposed
inthisbook.
ix
Contents
PartI Information-TheoreticCryptographyandPerfectSecrecy
1 Information-TheoreticCryptographyandPerfectSecrecy............. 3
1.1 Introduction ............................................................. 3
1.2 Entropy:FromThermodynamicstoInformationTheory ............. 4
1.3 Information Theory: Everywhere in the Ecosystem of
Cryptography ........................................................... 5
1.4 PerfectSecrecy ......................................................... 6
1.4.1 Notions ......................................................... 7
1.4.2 Approaches ..................................................... 7
1.4.3 Variants ......................................................... 7
1.4.4 ApplicationsinCryptography ................................. 8
1.5 One-Time Pad (OTP): The Only Real-World
Implementation ......................................................... 9
1.5.1 TheEcosystemofOTPCryptography ........................ 10
1.5.2 TheRoleofOTPintheFutureofCryptography ............. 11
2 Information-TheoreticCryptography:AManeuverinthe
Trade-OffSpaceofCryptographyinIoT ................................. 15
2.1 IntroductionandBasicConcepts ...................................... 15
2.2 Real-TimeCryptography ............................................... 16
2.2.1 Ecosystem ...................................................... 16
2.3 Resource-ConstrainedCryptography .................................. 19
2.3.1 EmbeddedCryptography ...................................... 19
2.3.2 LightweightCryptography ..................................... 21
2.4 CryptographyinIoT .................................................... 23
2.4.1 Ecosystem ...................................................... 23
2.4.2 Real-TimeCryptographyinIoT ............................... 25
xi