DocumentCode
2857745
Title
Equivocations for the simple substitution cipher with erasure-prone ciphertext
Author
Harrison, Willie K. ; McLaughlin, Steven W.
Author_Institution
Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA, USA
fYear
2012
fDate
3-7 Sept. 2012
Firstpage
622
Lastpage
626
Abstract
In this paper, we analyze an attack scenario for the simple substitution cipher using the wiretap channel model, where the attacker only has access to error-prone ciphertext at the output of a packet erasure channel (PEC). Each packet is comprised of exactly one symbol of ciphertext, and hence, the attacker´s channel could be viewed as a symbol erasure channel. Information-theoretic cryptanalysis provides key and message equivocations for the cipher in general, and then gives the results as functions of the error-free ciphertext equivocations. The findings characterize the increase in equivocation that might be expected if encrypted data were further encoded using wiretap codes that introduce symbol erasures to passive eavesdroppers.
Keywords
cryptography; attack scenario; attacker channel; equivocations; erasure prone ciphertext; error free ciphertext equivocation; error prone ciphertext; information theoretic cryptanalysis; packet erasure channel; passive eavesdroppers; substitution cipher; symbol erasure channel; symbol erasures; wiretap channel model; wiretap codes; Conferences; Encoding; Vectors;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory Workshop (ITW), 2012 IEEE
Conference_Location
Lausanne
Print_ISBN
978-1-4673-0224-1
Electronic_ISBN
978-1-4673-0222-7
Type
conf
DOI
10.1109/ITW.2012.6404752
Filename
6404752
Link To Document