DocumentCode :
3100861
Title :
Weak keys of graph cryptography
Author :
Prissette, Cyril
fYear :
2004
fDate :
19-23 April 2004
Firstpage :
419
Lastpage :
420
Abstract :
This paper presents two families of weak keys, which can be combined to build a family of very weak keys. The detection algorithm of weak keys is introduced. Graph cryptography relics on the fact that a path in a directed graph can he expressed using the vertices or the edges. The main idea is to represent the encryption of any symbol with Markov chains. This is possible because the encryption of each symbol only depends on the previous encrypted symbol. Experimental results show that the key should always be tested to detect if it is an absorbing key, and if any absorbing sub key is a polyalphabetic substitution key.
Keywords :
Markov processes; cryptography; directed graphs; symbolic substitution; Markov chain; absorbing key detection; absorbing sub key detection; detection algorithm; directed graph; encryption; graph cryptography; graph edge; graph vertice; key test; polyalphabetic substitution key; symbol representation; weak key; Binary sequences; Cryptography; Detection algorithms; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Communication Technologies: From Theory to Applications, 2004. Proceedings. 2004 International Conference on
Print_ISBN :
0-7803-8482-2
Type :
conf
DOI :
10.1109/ICTTA.2004.1307810
Filename :
1307810
Link To Document :
بازگشت