Cryptography Reference
In-Depth Information
Enemy cryptanalyst
Message
source
X
Encipherer
C
Decipherer
C
−1
Message
X
Cryptogram
Y
Key
K
Key
source
Figure 1.5.
The Shannon encryption model.
Following the Shannon Theory, we do not encrypt fixed messages, but messages
coming from a plaintext source. The plaintext source generates random texts according
to some given probability distribution. For instance, with the distribution of plain
English texts, the probability that the plaintext is
hello world
is much greater
(particularly when the message is a textbook about a programming language) than the
probability that it is
gbwiub oafp
(except maybe in some Vogon poetry).
16
Following the Shannon Theory, a cipher is given by
1. a plaintext source (with the corresponding distribution),
2. a secret key distribution,
3. a ciphertext space,
4. a rule which transforms any plaintext
X
andakey
K
by a ciphertext
Y
=
C
K
(
X
),
5. a rule which enables recovering
X
from
K
and
Y
C
−
1
K
=
C
K
(
X
)as
X
=
(
Y
).
(see Fig. 1.5.) A more intuitive definition of a cipher includes
1. a plaintext space, a ciphertext space, a key space,
2. a key generation algorithm,
3. an encryption algorithm,
4. a decryption algorithm.
These definitions relate to
conventional cryptography
.
16
See the
Hitch Hiker's Guide to the Galaxy
trilogy by Douglas Adams.
Search WWH ::
Custom Search