Title :
Equivocations for the simple substitution cipher with erasure-prone ciphertext
Author :
Harrison, Willie K. ; McLaughlin, Steven W.
Author_Institution :
Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA, USA
Abstract :
In this paper, we analyze an attack scenario for the simple substitution cipher using the wiretap channel model, where the attacker only has access to error-prone ciphertext at the output of a packet erasure channel (PEC). Each packet is comprised of exactly one symbol of ciphertext, and hence, the attacker´s channel could be viewed as a symbol erasure channel. Information-theoretic cryptanalysis provides key and message equivocations for the cipher in general, and then gives the results as functions of the error-free ciphertext equivocations. The findings characterize the increase in equivocation that might be expected if encrypted data were further encoded using wiretap codes that introduce symbol erasures to passive eavesdroppers.
Keywords :
cryptography; attack scenario; attacker channel; equivocations; erasure prone ciphertext; error free ciphertext equivocation; error prone ciphertext; information theoretic cryptanalysis; packet erasure channel; passive eavesdroppers; substitution cipher; symbol erasure channel; symbol erasures; wiretap channel model; wiretap codes; Conferences; Encoding; Vectors;
Conference_Titel :
Information Theory Workshop (ITW), 2012 IEEE
Conference_Location :
Lausanne
Print_ISBN :
978-1-4673-0224-1
Electronic_ISBN :
978-1-4673-0222-7
DOI :
10.1109/ITW.2012.6404752