A large-deviations notion of perfect secrecy

被引:15
|
作者
Merhav, N [1 ]
机构
[1] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
关键词
cryptanalysis; cryptography; Shannon cipher system;
D O I
10.1109/TIT.2002.807301
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the Shannon cipher system with a variable key rate, and study the necessary and sufficient conditions for perfect secrecy in the sense that the exponential rate of the probability of breaking into the system would not be improved by observing the cryptogram. For a memoryless plaintext source, we derive achievable lower bounds on the number of key bits needed for almost every plaintext sequence in every type class. The corresponding minimum achievable average key rate turns out to be the negative logarithm of the probability of the most likely plaintext letter, which is in general, smaller than the entropy.
引用
收藏
页码:506 / 508
页数:3
相关论文
共 50 条
  • [41] Introducing Perfect Forward Secrecy for AN.ON
    Westermann, Benedikt
    Kesdogan, Dogan
    [J]. NETWORKED SERVICES AND APPLICATIONS - ENGINEERING, CONTROL AND MANAGEMENT, 2010, 6164 : 132 - 142
  • [42] Large deviations for cascades and cascades of large deviations
    Rouault, A
    [J]. MATHEMATICS AND COMPUTER SCIENCE III: ALGORITHMS, TREES, COMBINATORICS AND PROBABILITIES, 2004, : 351 - 362
  • [43] State Estimation Codes for Perfect Secrecy
    Tsiamis, Anastasios
    Gatsis, Konstantinos
    Pappas, George J.
    [J]. 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [44] SECRECY SYSTEMS APPROXIMATING PERFECT AND IDEAL SECRECY - ESSENTIAL DILEMMA OF CRYPTANALYSIS
    GEFFE, PR
    [J]. PROCEEDINGS OF THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, 1965, 53 (09): : 1229 - &
  • [45] The notion of current relevance in the Thai perfect
    Howard, K
    [J]. LINGUISTICS, 2000, 38 (02) : 373 - 407
  • [46] Perfect secrecy systems immune to spoofing attacks
    Michael Huber
    [J]. International Journal of Information Security, 2012, 11 : 281 - 289
  • [47] Three Constructions of Authentication Codes with Perfect Secrecy
    Cunsheng Ding
    Xiaojian Tian
    [J]. Designs, Codes and Cryptography, 2004, 33 : 227 - 239
  • [48] A Practical Perfect Secrecy Approach for IoBT Systems
    Moltafet, Mohammad
    Sadjadpour, Hamid R.
    Rezki, Zouheir
    [J]. MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
  • [49] Perfect secrecy cryptosystem with nonuniform distribution of keys
    Tian C.
    [J]. Tongxin Xuebao/Journal on Communications, 2018, 39 (11): : 1 - 9
  • [50] Large Deviations
    Varadhan, S. R. S.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONGRESS OF MATHEMATICIANS, VOL I: PLENARY LECTURES AND CEREMONIES, 2010, : 622 - 639