Computer Science Journal of Moldova (Apr 2016)

Stream Deniable-Encryption Algorithms

  • N.A. Moldovyan ,
  • A.A. Moldovyan,
  • D.N. Moldovyan,
  • V.A. Shcherbacov

Journal volume & issue
Vol. 24, no. 1(70)
pp. 68 – 82

Abstract

Read online

A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher. One of the key streams is generated depending on the secret key and the other one is generated depending on the fake key. The key streams are mixed with the secret and fake data streams so that the output ciphertext looks like the ciphertext produced by some probabilistic encryption algorithm applied to the fake message, while using the fake key. When the receiver or/and sender of the ciphertext are coerced to open the encryption key and the source message, they open the fake key and the fake message. To disclose their lie the coercer should demonstrate possibility of the alternative decryption of the ciphertext, however this is a computationally hard problem.

Keywords