{"id":"https://openalex.org/W4310902907","doi":"https://doi.org/10.1109/itw54588.2022.9965864","title":"Using data compression and randomisation to build an unconditionally secure short key cipher","display_name":"Using data compression and randomisation to build an unconditionally secure short key cipher","publication_year":2022,"publication_date":"2022-11-01","ids":{"openalex":"https://openalex.org/W4310902907","doi":"https://doi.org/10.1109/itw54588.2022.9965864"},"language":"en","primary_location":{"id":"doi:10.1109/itw54588.2022.9965864","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw54588.2022.9965864","pdf_url":null,"source":{"id":"https://openalex.org/S4363606450","display_name":"2022 IEEE Information Theory Workshop (ITW)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028123461","display_name":"Boris Ryabko","orcid":"https://orcid.org/0000-0002-7232-9644"},"institutions":[{"id":"https://openalex.org/I4210127387","display_name":"Siberian Branch of the Russian Academy of Sciences","ror":"https://ror.org/02frkq021","country_code":"RU","type":"funder","lineage":["https://openalex.org/I1313323035","https://openalex.org/I4210127387"]},{"id":"https://openalex.org/I4210137651","display_name":"Institute of Computational Technologies","ror":"https://ror.org/02x3mf211","country_code":"RU","type":"facility","lineage":["https://openalex.org/I1313323035","https://openalex.org/I4210097085","https://openalex.org/I4210137651"]},{"id":"https://openalex.org/I188973947","display_name":"Novosibirsk State University","ror":"https://ror.org/04t2ss102","country_code":"RU","type":"education","lineage":["https://openalex.org/I188973947"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Boris Ryabko","raw_affiliation_strings":["Novosibirsk State University,Federal Research Center for Information and Computational Technologies of SB RAS,Novosibirsk,Russian Federation","Federal Research Center for Information and Computational Technologies of SB RAS, Novosibirsk State University, Novosibirsk, Russian Federation"],"affiliations":[{"raw_affiliation_string":"Novosibirsk State University,Federal Research Center for Information and Computational Technologies of SB RAS,Novosibirsk,Russian Federation","institution_ids":["https://openalex.org/I4210137651"]},{"raw_affiliation_string":"Federal Research Center for Information and Computational Technologies of SB RAS, Novosibirsk State University, Novosibirsk, Russian Federation","institution_ids":["https://openalex.org/I4210127387","https://openalex.org/I188973947"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5028123461"],"corresponding_institution_ids":["https://openalex.org/I188973947","https://openalex.org/I4210127387","https://openalex.org/I4210137651"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12277199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"238","last_page":"242"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7730987668037415},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7511481046676636},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6085211038589478},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5624454617500305},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.5141127705574036},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5002114772796631},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.4837915599346161},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.47797152400016785},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46226561069488525},{"id":"https://openalex.org/keywords/cbc-mac","display_name":"CBC-MAC","score":0.4296289384365082},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4164665937423706},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3216339349746704},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.25698602199554443}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7730987668037415},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7511481046676636},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6085211038589478},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5624454617500305},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.5141127705574036},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5002114772796631},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.4837915599346161},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47797152400016785},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46226561069488525},{"id":"https://openalex.org/C156529985","wikidata":"https://www.wikidata.org/wiki/Q2736227","display_name":"CBC-MAC","level":4,"score":0.4296289384365082},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4164665937423706},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3216339349746704},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25698602199554443},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw54588.2022.9965864","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw54588.2022.9965864","pdf_url":null,"source":{"id":"https://openalex.org/S4363606450","display_name":"2022 IEEE Information Theory Workshop (ITW)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1645068757","https://openalex.org/W1892454167","https://openalex.org/W1917015688","https://openalex.org/W2023140349","https://openalex.org/W2029071561","https://openalex.org/W2099778037","https://openalex.org/W2106895305","https://openalex.org/W2109394932","https://openalex.org/W2110298819","https://openalex.org/W2112450615","https://openalex.org/W2115109072","https://openalex.org/W2121937998","https://openalex.org/W2150477349","https://openalex.org/W2479395339","https://openalex.org/W2922301978","https://openalex.org/W2998261580","https://openalex.org/W3108844855","https://openalex.org/W3117976059","https://openalex.org/W3188530052","https://openalex.org/W6636876979","https://openalex.org/W6799279176"],"related_works":["https://openalex.org/W2092816212","https://openalex.org/W2616087211","https://openalex.org/W1586481148","https://openalex.org/W3028832943","https://openalex.org/W138071016","https://openalex.org/W4200387112","https://openalex.org/W4390662504","https://openalex.org/W2380026892","https://openalex.org/W2527308691","https://openalex.org/W4313287912"],"abstract_inverted_index":{"We":[0],"consider":[1],"the":[2,11,14,20,23,38,42,59,79,86,89,92,100],"problem":[3],"of":[4,22,91],"constructing":[5],"an":[6],"unconditionally":[7],"secure":[8],"cipher":[9,68],"for":[10,58,72],"case":[12,60],"when":[13,61],"key":[15,80],"length":[16,21,81,90],"is":[17,97],"less":[18],"than":[19],"encrypted":[24,39,93],"message.":[25],"(Unconditional":[26],"security":[27,102],"means":[28],"that":[29,78],"a":[30,76],"computationally":[31],"unbounded":[32],"adversary":[33],"cannot":[34],"obtain":[35],"information":[36],"about":[37],"message":[40,62],"without":[41],"key.)":[43],"In":[44],"this":[45],"article,":[46],"we":[47],"propose":[48],"data":[49],"compression":[50],"and":[51],"randomisation":[52],"techniques":[53],"combined":[54],"with":[55],"entropically-secure":[56],"encryption":[57,73],"statistics":[63],"are":[64],"known.":[65],"The":[66],"resulting":[67],"can":[69],"be":[70],"used":[71],"in":[74],"such":[75],"way":[77],"does":[82],"not":[83],"depend":[84],"on":[85],"entropy":[87],"or":[88],"message;":[94],"instead,":[95],"it":[96],"determined":[98],"by":[99],"required":[101],"level.":[103]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
