Information-theoretic security guarantees security even if the adversary has unlimited computing power, by contrast with cryptography where the adversary is assumed to have bounded computational power. Hence, information-theoretic security does not depend for its effectiveness on typically unproven assumptions about computational hardness. Information-theoretically secure cryptosystems have been used, for instance, for the most sensitive governmental communications, such as diplomatic cables and high-level military communications.
- Olivier Rioul, LTCI-Telecom Paris, firstname.lastname@example.org
- Mireille Sarkiss, Telecom Sud Paris, email@example.com
- Aslan Tchamkerten, LTCI-Telecom Paris, firstname.lastname@example.org
- Michele Wigger, LTCI-Telecom Paris, email@example.com
- E. De Chérisey, S. Guilley, O. Rioul, D. Jayasinghe, “Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue”, Journal of Information Security, 2020.
- S. Kamel, M. Sarkiss, M. Wigger, GRB. Othman. “Secrecy capacity-memory tradeoff of erasure broadcast channels”, IEEE Transactions on Information Theory, 2019.