**Information-theoretic Security**

A cryptosystem is **information-theoretically secure** if its security derives purely from information theory. That is, it is secure even when the adversary has unlimited computing power. The adversary simply does not have enough information to break the security. An algorithm or encryption protocol that has information-theoretic security does not depend for its effectiveness on unproven assumptions about computational hardness and such an algorithm is not vulnerable to future developments in quantum computing. An example of an information-theoretically secure cryptosystem is the one-time pad.

An interesting special case is **perfect security**: an encryption algorithm is perfectly secure if a ciphertext produced using it provides no information about the plaintext without knowledge of the key. If *E* is a perfectly secure encryption function, for any fixed message *m* there must exist for each ciphertext *c* at least one key such that . It has been proven that any cipher with the perfect secrecy property must use keys with effectively the same requirements as one-time pad keys. There is also a weaker notion of security defined by A. Wyner and followed by many people in the area of information theory recently.

It is common for a cryptosystem to leak some information but nevertheless maintain its security properties even against an adversary that has unlimited computational resources. Such a cryptosystem would have information theoretic but not perfect security. The exact definition of security would depend on the cryptosystem in question.

There are a variety of cryptographic tasks for which information-theoretic security is a meaningful and useful requirement. A few of these are:

- Secret sharing schemes such as Shamir's are information-theoretically secure (and also perfectly secure) in that less than the requisite number of shares of the secret provide no information about the secret.
- More generally, secure multiparty computation protocols often, but not always have information theoretic security.
- Private information retrieval with multiple databases can be achieved with information-theoretic privacy for the user's query.
- Reductions between cryptographic primitives or tasks can often be achieved information-theoretically. Such reductions are important from a theoretical perspective, because they establish that primitive can be realized if primitive can be realized.
- Symmetric encryption can be constructed under an information-theoretic notion of security called entropic security, which assumes that the adversary knows almost nothing about the message being sent. The goal here is to hide
*all functions*of the plaintext rather than all information about it. - Quantum cryptography is largely part of information-theoretic cryptography.

Read more about Information-theoretic Security: Unconditional Security

### Other articles related to "security":

**Information-theoretic Security**- Unconditional Security

...

**Information-theoretic security**is often used interchangeably with unconditional

**security**...

### Famous quotes containing the word security:

“Is a Bill of Rights a *security* for [religious liberty]? If there were but one sect in America, a Bill of Rights would be a small protection for liberty.... Freedom derives from a multiplicity of sects, which pervade America, and which is the best and only *security* for religious liberty in any society. For where there is such a variety of sects, there cannot be a majority of any one sect to oppress and persecute the rest.”

—James Madison (1751–1836)