Show simple item record

AuthorAbdellatif, Basem
AuthorElfouly, Tarek
AuthorAbualsaud, Khalid
AuthorGouissem, Ala
AuthorYaacoub, Elias
AuthorKhattab, Tamer
Available date2022-11-01T09:01:33Z
Publication Date2021
Publication Name2021 International Wireless Communications and Mobile Computing, IWCMC 2021
ResourceScopus
Resource2-s2.0-85125621407
URIhttp://dx.doi.org/10.1109/IWCMC51323.2021.9498850
URIhttp://hdl.handle.net/10576/35710
AbstractIn spite of the wide spread of practical crypto- systems and ciphers nowadays, they still lack a unique metric to measure the secrecy level they provide. Their strength is measured in an ad-hoc way by exposing them to different kinds of attacks. In addition, their ability to hold secure against these attacks is evaluated in time and computations. In this paper, we introduce an approach for calculating the equivocation of the secret key used in these ciphers. In addition, we prove that it can be used as an indicator for the work required to break the cipher. This will help in unifying the metrics used in evaluating the strength of the ciphers and in comparing them with the classical information theoretic secreacy measures. 2021 IEEE
SponsorVI. ACKNOWLEDGMENT This publication was made possible by the NPRP award [NPRP 10-1205-160012] from the Qatar National Research Fund (a member of The Qatar Foundation). The statements made herein are solely the responsibility of the authors.
Languageen
PublisherInstitute of Electrical and Electronics Engineers Inc.
SubjectCiphers
Complexity
Computations
Cryptanalysis
Cryptography
Equivocation
Information theoretic secrecy
TitleTowards Information Theoretic Interpretation of Practical Ciphers
TypeConference Paper
Pagination807-812
dc.accessType Abstract Only


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record