Bounds on Key Appearance Equivocation for Substitution Ciphers

Computer Science – Information Theory

Scientific paper

Rate now

  [ 3.85 ] – very good Voters 1   Comments 0

Details

3 pages, typos corrected, submitted to IEEE Transactions on Information Theory

Scientific paper

The average conditional entropy of the key given the message and its corresponding cryptogram, H(K|M,C), which is reffer as a key appearance equivocation, was proposed as a theoretical measure of the strength of the cipher system under a known-plaintext attack by Dunham in 1980. In the same work (among other things), lower and upper bounds for H(S}_{M}|M^L,C^L) are found and its asymptotic behaviour as a function of cryptogram length L is described for simple substitution ciphers i.e. when the key space S_{M} is the symmetric group acting on a discrete alphabet M. In the present paper we consider the same problem when the key space is an arbitrary subgroup K of S_{M} and generalize Dunham's result.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Bounds on Key Appearance Equivocation for Substitution Ciphers has received 1 rating(s) and 0 review(s), resulting in an average rating of 3.85 on a scale from 1 to 5. The overall rating for this scientific paper is very good.

If you have personal experience with Bounds on Key Appearance Equivocation for Substitution Ciphers, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Bounds on Key Appearance Equivocation for Substitution Ciphers will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-117615

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.