loading page

Implementation of Entropically Secure Encryption: Securing Personal Health Data
  • Mehmet Hüseyin Temel,
  • Boris Škorić,
  • Idelfonso Tafur Monroy
Mehmet Hüseyin Temel
Eindhoven University of Technology

Corresponding Author:m.h.temel@tue.nl

Author Profile
Boris Škorić
Eindhoven University of Technology
Author Profile
Idelfonso Tafur Monroy
Eindhoven University of Technology
Author Profile

Abstract

Entropically Secure Encryption (ESE) offers unconditional security with shorter keys compared to the One-Time Pad. In this paper, we present the first implementation of ESE for bulk encryption. The main computational bottleneck for bulk ESE is a multiplication in a very large finite field. This involves multiplication of polynomials followed by modular reduction. We have implemented polynomial multiplication based on the gf2x library, with some modifications that avoid inputs of vastly different length, thus improving speed. Additionally, we have implemented a recently proposed efficient reduction algorithm that works for any polynomial degree. We investigate two use cases: X-ray images of patients and human genome data. We conduct entropy estimation using compression methods whose results determine the key lengths required for ESE. We report running times for all steps of the encryption. We discuss the potential of ESE to be used in conjunction with Quantum Key Distribution (QKD), in order to achieve full information-theoretic security of QKD-protected links for these use cases.
Submitted to Electronics Letters
05 Apr 2024Submission Checks Completed
05 Apr 2024Assigned to Editor
05 Apr 2024Review(s) Completed, Editorial Evaluation Pending
16 May 2024Reviewer(s) Assigned
25 Aug 2024Editorial Decision: Revise Major
13 Sep 20241st Revision Received
19 Sep 2024Submission Checks Completed
19 Sep 2024Assigned to Editor
19 Sep 2024Review(s) Completed, Editorial Evaluation Pending
19 Sep 2024Reviewer(s) Assigned
08 Oct 2024Editorial Decision: Accept