Estimators in Cryptography

Journal Title: Annals. Computer Science Series - Year 2009, Vol 7, Issue 2

Abstract

One of the main problems in cryptography is to give criteria to provide good comparators of cipher systems. The security of a cipher system must include the security of the algorithm, the security of the key generator and management module (see [BM94], [CM97],[Mau92a]) and the security of the cryptographic key agreement protocol (see [Mau93a],[MC94],[Mau93b],[Mau92b]). This paper gives show the necessary mathematical background to estimate the most important cryptographic measures of the key generators and of the unconditionally key agreement protocols. These cryptographic measures are the Shannon entropy (for the key generator module) and Renyi entropy of order a for the key agreement protocol.

Authors and Affiliations

Nicolae Constantinescu

Keywords

Related Articles

Reduction of enhanced maintenance effort using ARM model and RMMM plan

Software maintenance effort is playing a very important role for the development of the software. In maintenance phase user request for change and effort required for the maintenance of software is more as compare to the...

Quadratic Regression and Factorial Analysis on the Effect of Climatic Elements on Global Food Production and Land Nutrients in Africa

The United Nation has its number one Sustainable Development Goal (SDG #1) of No Poverty Global World which is, Agriculture and Food Security. The question to be asked is how do we make production of food like maize, ric...

Variable Selection in the Modeling of Nigeria Economic Growth

This study aimed at identifying and retaining factors that contributed immensely to economic growth in Nigeria based on some variable selection methods. Stepwise regressions are often not efficient when there is multicol...

An Improved Procedure for Fourier Regression Analysis

Fourier regression is a method used to represent time series by a set of elementary functions called basis. This work was used to propose a new procedure for Fourier regression which has the ability to reveal the period...

Topology Management for Wireless Mesh Network

This research formulated and simulated a topology management scheme for wireless mesh network (WMN) in areas of scalability and reliability; considering its vast present limitations in commercialization in many applicati...

Download PDF file
  • EP ID EP129168
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

Nicolae Constantinescu (2009). Estimators in Cryptography. Annals. Computer Science Series, 7(2), 23-30. https://europub.co.uk/articles/-A-129168