Title :
Weak keys of graph cryptography
Author :
Prissette, Cyril
Abstract :
This paper presents two families of weak keys, which can be combined to build a family of very weak keys. The detection algorithm of weak keys is introduced. Graph cryptography relics on the fact that a path in a directed graph can he expressed using the vertices or the edges. The main idea is to represent the encryption of any symbol with Markov chains. This is possible because the encryption of each symbol only depends on the previous encrypted symbol. Experimental results show that the key should always be tested to detect if it is an absorbing key, and if any absorbing sub key is a polyalphabetic substitution key.
Keywords :
Markov processes; cryptography; directed graphs; symbolic substitution; Markov chain; absorbing key detection; absorbing sub key detection; detection algorithm; directed graph; encryption; graph cryptography; graph edge; graph vertice; key test; polyalphabetic substitution key; symbol representation; weak key; Binary sequences; Cryptography; Detection algorithms; Testing;
Conference_Titel :
Information and Communication Technologies: From Theory to Applications, 2004. Proceedings. 2004 International Conference on
Print_ISBN :
0-7803-8482-2
DOI :
10.1109/ICTTA.2004.1307810