Cryptography Reference
In-Depth Information
then the probabilities for the ciphertexts, p C ( c j ) , for j =1 , 2 , 3 , 4 , is derived as
follows:
p c 1 = p k 1 ·
p s 1 + p k 2 ·
p s 4 + p k 3 ·
p s 3 =
0 . 3
·
0 . 1+0 . 3
·
0 . 4+0 . 4
·
0 . 3=0 . 27 ,
and similarly
p c 2 =0 . 25 , p c 3 =0 . 19 , and p c 4 =0 . 29 .
Now we may calculate some conditional probabilities to determine key equiv-
alence. First, we look at individual entropies.
Using the fact cited in Footnote 11.4 on page 432, we calculate the following:
p k 1 | c 1 = p k 1 ·
p s 1
p c 1
= 0 . 3
0 . 1
0 . 27
·
0 . 1111 ,
and similarly,
p k 1 | c 2
0 . 2400; p k 1 | c 3
0 . 4737; p k 1 | c 4
0 . 4138;
p k 2 | c 1
0 . 444; p k 2 | c 2
0 . 1200; p k 2 | c 3
0 . 3158; p k 2 | c 4
0 . 3103;
p k 3 | c 1
0 . 444; p k 3 | c 2
0 . 6400; p k 3 | c 3
0 . 2105; p k 3 | c 4
0 . 2759 .
Thus, using Equation (11.3) as a formula, we get
H (
K | C
)
1 . 4342 .
Now we calculate, using Equation (11.1) ,
H (
K
)=
0 . 3log 2 (0 . 3)
0 . 3log 2 (0 . 3)
0 . 4log 2 (0 . 4)
1 . 5709 ,
and similarly, H (
M
)
1 . 8464 , H (
C
)
1 . 9831 . Therefore,
H (
K
)+ H (
M
)
H (
C
)
1 . 4342 ,
which agrees with Equation (11.8) , as an illustration.
This tells us that when Eve intercepts encrypted conversation between Bob
and Alice, she obtains H (
) information about the key, and this is deter-
mined bythe right-hand side of Equation (11.8). Moreover, this is, of course, a
ciphertext-onlyattack.
Now define
K | C
C
n to denote all n -grams (ciphertexts of length n ), and similarly
M
n will denote all n -grams of plaintext, with associated probabilitydistribu-
tions, then as with Equation (11.8), we have
n )= H (
n )
n ) ,
H (
K | C
K
)+ H (
M
H (
C
(11.9)
Search WWH ::




Custom Search