Abstract
In 1949 Shannon published the famous paper “Communication theory of secrecy systems” where he briefly described two ciphers, but did not investigate their properties. In this note we carry out information-theoretical analysis of these ciphers. In particular, we propose estimations of the cipher equivocation and the probability of correct deciphering without key.
Similar content being viewed by others
References
Calmon E.P., Medard M., Varia M., Duffy K.R., Christiansen M.M., Zeger L.M.: Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security. arxiv:1503.08515 (2015).
Cover T.M., Thomas J.A.: Elements of Information Theory. Wiley-Interscience, New York (2006).
Diffie W., Hellman M.E.: Privacy and authentication: an introduction to cryptography. Proc. IEEE 67(3), 397–427 (1979).
Hellman M.E.: An extension of the Shannon theory approach to cryptography. IEEE Trans. Inf. Theory 23(3), 289–294 (1977).
Lu S.-C.: The existence of good cryptosystems for key rates greater than the message redundancy. IEEE Trans. Inf. Theory 25(4), 475–477 (1979).
Ryabko B.: The Vernam cipher is robust to small deviations from randomness. Probl. Inf. Transm. 51(1), 82–86 (2015).
Shannon C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949).
Shannon C.E.: Prediction and entropy of printed English. Bell Syst. Tech. J. 30(1), 50–64 (1951).
Takahira R., Tanaka-Ishii K., Debowski L.: Entropy rate estimates for natural languagea new extrapolation of compressed large-scale corpora. Entropy 18(10), 364 (2016).
Acknowledgements
This research was supported by Russian Foundation for Basic Research (Grant No. 15-29-07932).
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by C. Mitchell.
This paper was presented in part at XV International Symposium “Problems of Redundancy in Information and Control Systems” September 26–29, 2016, St. Petersburg, Russia.
Appendix
Appendix
Proof of Lemma
The following chain of equalities and inequalities is valid:
The proof is based on well-known properties of the Shannon entropy which can be found, for example, in [2]. More precisely, the first equation follows from the independence of \(X^1, X^2, \ldots , X^s\), whereas the second equation is valid because Z is a function of \(X^1, X^2, \ldots , X^s\), see (1). The third equation is a well-known property of the entropy. Having taken into account that \(X^s\) is determined if \( X^2, \ldots , X^{s-1}, Z\) are known, we obtain the last equation. The inequality also follows from the properties of the Shannon entropy [2]. Thus,
Taking into account that for any process U over alphabet \(A = \{0, \ldots , n-1 \} \)
we obtain (3) from (10). In order to prove (4) we note that analogously to (10), we can obtain the following:
for any \( 1 \le j \le \). From this inequality we obtain (4). \(\square \)
Proof of Theorem
For the first cipher \(s > 2\) and all \(X^i\), \(i = 1, \ldots , s\) have the same probability distribution. Having taken into account that \(h_t(X^i) = h_t(X^1)\) for \(i = 1, \ldots , s\), from (4) and (6) we obtain (7). For the second cipher \(s=2\) and (7) follows from (3).
In order to prove ii), denote
Let us consider any method G of encryption of \(Z_1 \ldots Z_k\) without key such that
and define
From Fano inequality (see [2, 5]) we obtain
where \( \hat{h}(p^*_j)\) is the following entropy:
From the last inequality we obtain
Having taken into account convexity of entropy, from this inequality and the definition \( p^* = t^{-1} \sum _{j=1}^t p^*_j \, \) we obtain
From this and well known inequality for the entropy \(H(u, v) \le H(u) + H(v) \) we obtain
Taking into account the Definition (2) and the statement (i), we obtain (ii).
In order to prove the third statement we will use the well-known Shannon–McMillan–Breiman theorem, see [2]. For conditional entropies it can be stated as follows:
\(\forall \varepsilon>0, \forall \delta > 0\), for almost all
\(Z_1,Z_2,\dots \) there exists \(n'\) such that if \(n > n'\) then
where \((X^1,Z)\) is stationary ergodic process.
According to Shannon–McMillan–Breiman theorem for any \(\varepsilon> 0, \delta > 0\) and almost all \(Z_1,Z_2,\dots \) there exists such \(n'\) that for \(t > n'\)
Let us define
The equation \( P( \Psi _Z ) > 1 - \delta \) immediately follows from (12). In order to prove (8), note that for any \(X^1 = X_1^1, \dots , X^1_t\), \(\bar{X}^1 = \bar{X}^1_2, \dots , \bar{X}^1_t\) from \( \Psi _Z\) we obtain from (12), (13)
From (13), (7) and the proven equation \( P( \Psi (Z) ) > 1 - \delta \) we obtain the following: \( \, |\Psi _Z | > ( 1- \delta ) 2^{ t \, (h_t(X|Z) - \varepsilon )} \, .\) Taking into account that it is valid for any \(\varepsilon> 0, \delta > 0\) and \(t > n'\), we obtain (9). Theorem is proven. \(\square \)
Rights and permissions
About this article
Cite this article
Ryabko, B. Properties of two Shannon’s ciphers. Des. Codes Cryptogr. 86, 989–995 (2018). https://doi.org/10.1007/s10623-017-0372-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-017-0372-2