See contact and information about the author at last page Perfect Secrecy under Deep Random assumption