A generalization of hellman’s extension of shannon’s approach to cryptography

N/ACitations
Citations of this article
43Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In his landmark 1977 paper [Hell77], Hellman extends the Shannon theory approach to cryptography [Shan49]. In particular, he shows that the expected number of spurious key decipherements on length n messages is at least 2H(K)-nD - 1 for any uniquely enci- pherable, uniquely decipherable cipher, as long as each key is equally likely and the set of meaningful cleartext messages follows a uniform distribution (where H(K) is the key entropy and D is the redundancy of the source language). In this paper, we show that Hellman’s result holds with no restrictions on the distribution of keys and messages. We also bound from above and below the key equivocation upon seeing the ciphertext. Sufficient conditions for these bounds to be tight are given. The results are obtained through very simple purely information theoretic arguments, with no needs for (explicit) counting arguments.

Cite

CITATION STYLE

APA

Beauchemin, P., & Brassard, G. (1988). A generalization of hellman’s extension of shannon’s approach to cryptography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 293 LNCS, p. 461). Springer Verlag. https://doi.org/10.1007/3-540-48184-2_42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free