DocumentCode
930396
Title
Random ciphering bounds on a class of secrecy systems and discrete message sources
Author
Lu, Shyue-Ching
Volume
25
Issue
4
fYear
1979
fDate
7/1/1979 12:00:00 AM
Firstpage
405
Lastpage
414
Abstract
The problem of enciphering a stationary finite discrete message so that a cryptanalyst is unlikely to decrypt an intercepted cryptogram is considered. Additive-like instantaneous block (ALIB) encipherers are studied that employ a list of
keywords of length
, called the cipher. An ALIB encipherer produces a cryptogram word of length
from a message word and a key word of the same length by combining corresponding message letters and key-word letters. Certain technical restrictions sure placed on the combining function. The decipherer uses a decoder which combines a letter from the key word used in enciphering with a letter from the cryptogram to form a letter of the decoded message. cryptanalyst also decodes letter by letter with an identical decoder; however, he uses a keyword that is not necessarily that used in enciphering. For a given message source and combiner, the design of the cipher consists in choosing the block length
, the key rate
, and the set of
key words. These are to be chosen so that
, the probability of correct decryptment of the message word, and
, the probability that the per letter nonzero Hamming distance between the decrypted message and the true message is smaller than
, are very small for every cryptanalyst. A set of pairs
for which there exist ciphers with key rate
such that,
and
can be made arbitrarily small for every cryptanalyst is determined using the concepts of random ciphering and exponential bounding.
keywords of length
, called the cipher. An ALIB encipherer produces a cryptogram word of length
from a message word and a key word of the same length by combining corresponding message letters and key-word letters. Certain technical restrictions sure placed on the combining function. The decipherer uses a decoder which combines a letter from the key word used in enciphering with a letter from the cryptogram to form a letter of the decoded message. cryptanalyst also decodes letter by letter with an identical decoder; however, he uses a keyword that is not necessarily that used in enciphering. For a given message source and combiner, the design of the cipher consists in choosing the block length
, the key rate
, and the set of
key words. These are to be chosen so that
, the probability of correct decryptment of the message word, and
, the probability that the per letter nonzero Hamming distance between the decrypted message and the true message is smaller than
, are very small for every cryptanalyst. A set of pairs
for which there exist ciphers with key rate
such that,
and
can be made arbitrarily small for every cryptanalyst is determined using the concepts of random ciphering and exponential bounding.Keywords
Cryptography; Cryptography; Decoding; Hamming distance; Helium; Mathematical model; Random sequences; Random variables;
fLanguage
English
Journal_Title
Information Theory, IEEE Transactions on
Publisher
ieee
ISSN
0018-9448
Type
jour
DOI
10.1109/TIT.1979.1056070
Filename
1056070
Link To Document