Estimators in Cryptography

Journal Title: Annals. Computer Science Series - Year 2009, Vol 7, Issue 2

Abstract

One of the main problems in cryptography is to give criteria to provide good comparators of cipher systems. The security of a cipher system must include the security of the algorithm, the security of the key generator and management module (see [BM94], [CM97],[Mau92a]) and the security of the cryptographic key agreement protocol (see [Mau93a],[MC94],[Mau93b],[Mau92b]). This paper gives show the necessary mathematical background to estimate the most important cryptographic measures of the key generators and of the unconditionally key agreement protocols. These cryptographic measures are the Shannon entropy (for the key generator module) and Renyi entropy of order a for the key agreement protocol.

Authors and Affiliations

Nicolae Constantinescu

Keywords

Related Articles

Adaptation and Usability of Quick Response Codes for Subscription to Mobile Network Operators’ Services

Mobile Network Operators (MNOs) permit subscribers to gain access to data, voice calls or short messaging services offered by their networks. Payments for any of these services could be via online payments platforms, sho...

Performance Evaluation of Improved Cognitive Complexity Metric and Other Code Based Complexity Metrics

Complexity metric is used to estimate various parameters such as software development cost, amount of time needed for implementation and effort required in understanding the software. In this paper, different software co...

An Improved Procedure for Fourier Regression Analysis

Fourier regression is a method used to represent time series by a set of elementary functions called basis. This work was used to propose a new procedure for Fourier regression which has the ability to reveal the period...

Image Fusion and Re-Modified SPIHT for Fused Image

This paper presents the Discrete Wavelet based fusion techniques for combining perceptually important image features. SPIHT (Set Partitioning in Hierarchical Trees) algorithm is an efficient method for lossy and lossless...

Using Predictive Machine Learning Regression Model To Predict The Population Of Nigeria

In any nation, there is always a government in place charged with the responsibly of governing the citizens of the country and for effective governance, there should be plan based on the number of citizens (population) i...

Download PDF file
  • EP ID EP129168
  • DOI -
  • Views 65
  • Downloads 0

How To Cite

Nicolae Constantinescu (2009). Estimators in Cryptography. Annals. Computer Science Series, 7(2), 23-30. https://europub.co.uk/articles/-A-129168