2000
DOI: 10.1007/3-540-46513-8_5
|View full text |Cite
|
Sign up to set email alerts
|

Guesswork and Variation Distance as Measures of Cipher Security

Abstract: Abstract. Absolute lower limits to the cost of cryptanalytic attacks are quantified, via a theory of guesswork. Conditional guesswork naturally expresses limits to known and chosen plaintext attacks. New inequalities are derived between various forms of guesswork and variation distance. The machinery thus offers a new technique for establishing the security of a cipher: When the work-factor of the optimal known or chosen plaintext attack against a cipher is bounded below by a prohibitively large number, then n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2000
2000
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 16 publications
(14 reference statements)
0
1
0
Order By: Relevance
“…The optimal strategy that minimizes the average number of questions is to guess the values of X in order of decreasing probabilities: first, the value with maximum probability p (1) , then the second maximum p (2) , and so on. The corresponding minimum average number of guesses is the guessing entropy [3] (also known as "guesswork" [4]):…”
Section: Guessing Entropymentioning
confidence: 99%
See 2 more Smart Citations
“…The optimal strategy that minimizes the average number of questions is to guess the values of X in order of decreasing probabilities: first, the value with maximum probability p (1) , then the second maximum p (2) , and so on. The corresponding minimum average number of guesses is the guessing entropy [3] (also known as "guesswork" [4]):…”
Section: Guessing Entropymentioning
confidence: 99%
“…A notable property is that the optimal upper bound does not depend on the value of K. The upper bound is mentioned by Pliam in [4] as an upper bound of ∆(p, u). The methodology of this paper, based on Schur concavity, greatly simplifies the derivation.…”
Section: Remark 20 (ϕ-Pinsker Boundsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is of primary importance to assess the "randomness" of a certain random variable X, which represents some identifier, cryptographic key, signature or any type of intended secret. Applications include pseudo-random bit generators [1], general cipher security [2], randomness extractors [3] and hash functions ( [4], Chapter 8), physically unclonable functions [5], true random number generators [6], to list but a few. In all of these examples, X takes finitely many values x ∈ {x 1 , x 2 , .…”
Section: Some Well-known "Randomness" Measuresmentioning
confidence: 99%
“…If we graph the cumulative distribution of password guessing probabilities, we have what John Pliam called the "work function": the relationship between the number of guesses the attacker makes and his probability of success [14]. How can we use our knowledge of these probability distributions (e.g.…”
Section: Using Password Guessing Attacks As a Strength Indicatormentioning
confidence: 99%