Cryptography Reference
In-Depth Information
Furthermore, we introduced the notion of redundancy of a (natural) language, as it is
often exploited when cryptanalysts try to attack an encryption system. Furthermore,
symmetric encryption systems are often analyzed using the key equivocation and
the unicity distance. If the unicity distance of a cipher is small, then relatively few
ciphertext bits are necessary to uniquely determine the key in use.
References
[1]
Shannon, C.E., “A Mathematical Theory of Communication,” Bell System Technical Journal ,Vol.
27, No. 3/4, July/October 1948, pp. 379-423/623-656.
[2]
Shannon, C.E., “Communication Theory of Secrecy Systems,” Bell System Technical Journal ,
Vol. 28, No. 4, October 1949, pp. 656-715.
[3]
Ash, R.B., Information Theory . Dover Publications, Mineola, NY, 1990.
[4]
Cover, T.M., and J.A. Thomas, Elements of Information Theory . John Wiley & Sons, New York,
1991.
[5]
McEliece, R., Theory of Information and Coding , 2nd edition. Cambridge University Press,
Cambridge, UK, 2002.
[6]
Shannon, C.E., “Prediction and Entropy of Printed English,” Bell System Technical Journal ,Vol.
30, January 1951, pp. 50-64.
Search WWH ::




Custom Search