2005 IEEE Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 2005
DOI: 10.1109/idaacs.2005.283018
|View full text |Cite
|
Sign up to set email alerts
|

Using Set Theoretic Estimation to Implement Shannon Secrecy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Each meta-symbol is analyzed for common language statistics based on their appearance in English. Language statistics constitute property sets that can be exploited using Set Theoretic Estimation (STE) and Set Methodology [2,10]. The STE property sets used in the attack are listed in Table 1.…”
Section: Example Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…Each meta-symbol is analyzed for common language statistics based on their appearance in English. Language statistics constitute property sets that can be exploited using Set Theoretic Estimation (STE) and Set Methodology [2,10]. The STE property sets used in the attack are listed in Table 1.…”
Section: Example Attacksmentioning
confidence: 99%
“…The decryption method takes the following form: Form sequences of two allowed 2-grams meta(2,2), e.g., etru, isis, isth, ruth, thet, this Form a correspondence between like and unlike patterns using symbols such as A and B (Table 3.2) where A is different from B and vice versa. Form their associated patterns of meta (2,3) in Table 4. Form their associated matching patterns of (2,4) in Table 5.…”
Section: Meta-2-gram Examplementioning
confidence: 99%
See 2 more Smart Citations