Cryptography Reference
In-Depth Information
Furthermore, we introduced the notion of redundancy of a (natural) language, as it is
often exploited when cryptanalysts try to attack an encryption system. Furthermore,
symmetric encryption systems are often analyzed using the key equivocation and
the unicity distance. If the unicity distance of a cipher is small, then relatively few
ciphertext bits are necessary to uniquely determine the key in use.
References
[1]
Shannon, C.E., “A Mathematical Theory of Communication,”
Bell System Technical Journal
,Vol.
27, No. 3/4, July/October 1948, pp. 379-423/623-656.
[2]
Shannon, C.E., “Communication Theory of Secrecy Systems,”
Bell System Technical Journal
,
Vol. 28, No. 4, October 1949, pp. 656-715.
[3]
Ash, R.B.,
Information Theory
. Dover Publications, Mineola, NY, 1990.
[4]
Cover, T.M., and J.A. Thomas,
Elements of Information Theory
. John Wiley & Sons, New York,
1991.
[5]
McEliece, R.,
Theory of Information and Coding
, 2nd edition. Cambridge University Press,
Cambridge, UK, 2002.
[6]
Shannon, C.E., “Prediction and Entropy of Printed English,”
Bell System Technical Journal
,Vol.
30, January 1951, pp. 50-64.