Statistical Methods for Cryptography

被引:0
|
作者
Rizzi, Alfredo [1 ]
机构
[1] Univ Roma La Sapienza, Dipartimento Stat Probabilita & Stat Applicate, I-00185 Rome, Italy
关键词
D O I
10.1007/978-3-642-03739-9_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this note, after recalling certain results regarding prime numbers, we will present the following theorem of interest to cryptography: Let two discrete s.v.'s (statistical variable) X, Y assume the value: 0, 1, 2,...,m - 1. Let X be uniformly distributed, that is, it assumes the value i(i = 0, 1,..., m - 1) with probability 1/m and let the second s.v. Y assume the value i with probability (pi : Sigma(m-1)(i=1)Pi = 1, pi >= 0). If the s.v. Z = X + Y (mod in) is uniformly distributed and m is a prime number, at least one of the two s. v. X and Y is uniformly distributed.
引用
收藏
页码:13 / 21
页数:9
相关论文
共 50 条
  • [1] The Relevance of Statistical Tests in Cryptography
    Simion, Emil
    [J]. IEEE SECURITY & PRIVACY, 2015, 13 (01) : 66 - 70
  • [2] Formal methods and cryptography
    Backes, Michael
    Pfitzmann, Birgit
    Waidner, Michael
    [J]. FM 2006: FORMAL METHODS, PROCEEDINGS, 2006, 4085 : 612 - 616
  • [3] Review of Security Methods Based on Classical Cryptography and Quantum Cryptography
    Subramani, Shalini
    Selvi, M.
    Kannan, A.
    Svn, Santhosh Kumar
    [J]. CYBERNETICS AND SYSTEMS, 2023,
  • [4] Research on Visual Cryptography Methods
    Shanmugasundari, T.
    Subban, Ravi
    Shanmugamoorthy, Saraswathi
    Manogari, S.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2017, : 975 - 980
  • [5] Methods of linear and differential relations in cryptography
    Malyshev, Fedor M.
    [J]. DISCRETE MATHEMATICS AND APPLICATIONS, 2024, 34 (03): : 145 - 166
  • [6] Symbolic methods in computational cryptography proofs
    Barthe, Gilles
    Gregoire, Benjamin
    Jacomme, Charlie
    Kremer, Steve
    Strub, Pierre-Yves
    [J]. 2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 136 - 151
  • [7] Cryptography methods using the RSA algorithm
    [J]. Lupu, C. (clupu@atlas.cpe.pub.ro), 2005, WSEAS (04):
  • [8] Statistical Steganalysis of High Capacity Image Steganography with Cryptography
    Sabnis, S. K.
    Awale, R. N.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 321 - 327
  • [9] Statistical cryptography using a fisher-schrodinger model
    Venkatesan, R. C.
    [J]. 2007 IEEE Symposium on Foundations of Computational Intelligence, Vols 1 and 2, 2007, : 487 - 494
  • [10] Information flow and quantum cryptography using statistical fluctuations
    Home, D
    Whitaker, MAB
    [J]. PHYSICAL REVIEW A, 2003, 67 (02):