• DocumentCode
    2857745
  • Title

    Equivocations for the simple substitution cipher with erasure-prone ciphertext

  • Author

    Harrison, Willie K. ; McLaughlin, Steven W.

  • Author_Institution
    Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA, USA
  • fYear
    2012
  • fDate
    3-7 Sept. 2012
  • Firstpage
    622
  • Lastpage
    626
  • Abstract
    In this paper, we analyze an attack scenario for the simple substitution cipher using the wiretap channel model, where the attacker only has access to error-prone ciphertext at the output of a packet erasure channel (PEC). Each packet is comprised of exactly one symbol of ciphertext, and hence, the attacker´s channel could be viewed as a symbol erasure channel. Information-theoretic cryptanalysis provides key and message equivocations for the cipher in general, and then gives the results as functions of the error-free ciphertext equivocations. The findings characterize the increase in equivocation that might be expected if encrypted data were further encoded using wiretap codes that introduce symbol erasures to passive eavesdroppers.
  • Keywords
    cryptography; attack scenario; attacker channel; equivocations; erasure prone ciphertext; error free ciphertext equivocation; error prone ciphertext; information theoretic cryptanalysis; packet erasure channel; passive eavesdroppers; substitution cipher; symbol erasure channel; symbol erasures; wiretap channel model; wiretap codes; Conferences; Encoding; Vectors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory Workshop (ITW), 2012 IEEE
  • Conference_Location
    Lausanne
  • Print_ISBN
    978-1-4673-0224-1
  • Electronic_ISBN
    978-1-4673-0222-7
  • Type

    conf

  • DOI
    10.1109/ITW.2012.6404752
  • Filename
    6404752