Estimators in Cryptography
Journal Title: Annals. Computer Science Series - Year 2009, Vol 7, Issue 2
Abstract
One of the main problems in cryptography is to give criteria to provide good comparators of cipher systems. The security of a cipher system must include the security of the algorithm, the security of the key generator and management module (see [BM94], [CM97],[Mau92a]) and the security of the cryptographic key agreement protocol (see [Mau93a],[MC94],[Mau93b],[Mau92b]). This paper gives show the necessary mathematical background to estimate the most important cryptographic measures of the key generators and of the unconditionally key agreement protocols. These cryptographic measures are the Shannon entropy (for the key generator module) and Renyi entropy of order a for the key agreement protocol.
Authors and Affiliations
Nicolae Constantinescu
A Minimal Closure Algorithm for Quantifying Impact of Requirement Changes on Network Performance
In network systems design, it is often difficult to quantify the impact of network performance brought by the requirement changes because of the complexities and dependencies among the changed and unchanged requirements....
An Exploratory Study of Critical Factors Affecting the Efficiency of Sorting Techniques (Shell, Heap and Treap)
The efficiency of sorting techniques has a significant impact on the overall efficiency of a program. The efficiency of Shell, Heap and Treap sorting techniques in terms of both running time and memory usage was studied,...
Parameterized Complexity on a New Sorting Algorithm: A Study in Simulation<br />
Sundararajan and Chakraborty (2007) introduced a new sorting algorithm by modifying the fast and popular Quick sort and removing the interchanges. In a subsequent empirical study, Sourabh, Sundararajan and Chakraborty (2...
Adaptation and Usability of Quick Response Codes for Subscription to Mobile Network Operators’ Services
Mobile Network Operators (MNOs) permit subscribers to gain access to data, voice calls or short messaging services offered by their networks. Payments for any of these services could be via online payments platforms, sho...
Mathematical Analysis of Blood Flow through a Stenosed Human Artery
This paper examines the mathematical analysis of blood flow through a stenosed human artery. Change in the nature of blood flow from its normal state to a disturbed flow condition due to the presence of stenoses in the h...