The Unicity Distance: An Upper Bound on the Probability of an Eavesdropper Successfully Estimating the Secret Key

نویسنده

  • A. Kh. Al Jabri
چکیده

The unicity distance, U, of a secret-key cipher is defined by Shannon as the minimum amount of intercepted ciphertext symbols needed, in principle, to uniquely determine the secret key and, therefore, break the cipher. Accordingly, for a ciphertext of size N symbols less than U, the estimated key will have a nonzero probability of error. Of interest is knowing the chance or probability that an eavesdropper, using the besf estimation rule, successfully estimates the secret key from N ciphertext symbols less than V. An upper bound on this probability is derived in this paper.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing

We consider secret key agreement by multiple parties observing correlated data and communicating interactively over an insecure communication channel. Our main contribution is a single-shot upper bound on the length of the secret keys that can be generated, without making any assumptions on the distribution of the underlying data. Heuristically, we bound the secret key length in terms of “how f...

متن کامل

Information-theoretic key agreement of multiple terminals: part I

We study the problem of information-theoretically secure secret key agreement under the well-known source model and channel model. In both of these models multiple terminals wish to create a shared secret key that is secure from an eavesdropper with unlimited computational resources. The terminals are all connected to a noiseless and authenticated but public communication channel. The terminals...

متن کامل

On Selecting the Nonce Length in Distance-Bounding Protocols

Distance-bounding protocols form a family of challenge–response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted prover. We provide a detailed security analysis of a family of such protocols. More precisely, we show that the secret key shared between the ver...

متن کامل

On The Secrecy of the Cognitive Interference Channel with Channel State

In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...

متن کامل

Information-theoretic key agreement of multiple terminal: part II: channel model

This is the second part of a two-part paper on information-theoretically secure secret key agreement. This paper focuses on the secret key rate problem under the channel model. In the channel model, a set of two or more terminals wish to create a shared secret key that is information-theoretically secure from an eavesdropper. The first terminal can choose a sequence of inputs to a discrete memo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. Process. Lett.

دوره 60  شماره 

صفحات  -

تاریخ انتشار 1996