Skip to main content

A Simplified Method for Computing the Key Equivocation for Additive-Like Instantaneous Block Encipherers

  • Chapter
General Theory of Information Transfer and Combinatorics

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4123))

  • 1798 Accesses

Abstract

We study the problem of computing the key equivocation rate for secrecy systems with additive-like instantaneous block (ALIB) encipherers. In general it is difficult to compute the exact value of the key equivocation rate for a secrecy system (\(f, {\cal C})\) with ALIB encipherer when the block length n becomes large. In this paper, we propose a simplified method for computing the key equivocation rate for two classes of secrecy systems with ALIB encipherers. 1) The function f is additive-like and the block encipherer C is the set of all n-length key words (sequences) of type P. 2) The function f is additive and the block encipherer C is a linear (n, m) code in the n-dimensional vector space GF(q)n. The method has a potential use for more classes of secrecy systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahlswede, R., Dueck, G.: Bad codes are good ciphers. Prob. Cont. Info. Theory 11, 337–351 (1982)

    MATH  MathSciNet  Google Scholar 

  2. Blom, R.J.: Bounds on key equivocation for simple substitution ciphers. IEEE Trans. Inform. 25, 8–18 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  3. Blom, R.J.: An upper bound on the key equivocation for pure ciphers. IEEE Trans. Inform. 30, 82–84 (1984)

    Article  MATH  Google Scholar 

  4. Csiszár, I., Körner, J.: Information Theory: Coding Theorem for Discrete Memoryless Systems. Academic, New York (1981)

    MATH  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Zhang, Z. (2006). A Simplified Method for Computing the Key Equivocation for Additive-Like Instantaneous Block Encipherers. In: Ahlswede, R., et al. General Theory of Information Transfer and Combinatorics. Lecture Notes in Computer Science, vol 4123. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11889342_14

Download citation

  • DOI: https://doi.org/10.1007/11889342_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46244-6

  • Online ISBN: 978-3-540-46245-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics