Estimators in Cryptography

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

7 pages

Scientific paper

One of the main problems in cryptography is to give criteria to provide good comparators of cipher systems. The security of a cipher system must include the security of the algorithm, the security of the key generator and management module (see [BM94], [CM97],[Mau92a]) and the security of the cryptographic key agreement protocol (see [Mau93a],[MC94],[Mau93b],[Mau92b]). This paper gives show the necessary mathematical background to estimate the most important cryptographic measures of the key generators and of the unconditionally key agreement protocols. These cryptographic measures are the Shannon entropy (for the key generator module) and Renyi entropy of order alpha for the key agreement protocol.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Estimators in Cryptography does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Estimators in Cryptography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Estimators in Cryptography will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-263510

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.