On construction of perfect ciphers
- Authors: Ratseev S.M1
-
Affiliations:
- Ulyanovsk State University
- Issue: Vol 18, No 1 (2014)
- Pages: 192-199
- Section: Articles
- URL: https://journal-vniispk.ru/1991-8615/article/view/20756
- DOI: https://doi.org/10.14498/vsgtu1271
- ID: 20756
Cite item
Full Text
Abstract
K. Shannon in the 40s of the 20th century introduced the concept of a perfect cipher, which provides the best protection of plaintexts. Perfect secrecy means that cryptanalyst can obtain no information about the plaintext by observing the ciphertext. In the paper we study the problem of construction of perfect ciphers on a given set of plaintexts $X$, a set of keys $K$ and a probability distribution $P (K)$. We give necessary and sufficient conditions for a perfect ciphers on given $X$, $K$ and $P (K)$. It is shown that this problem is reduced to construction of the set of partitions of the set $K$ with certain conditions. As one of the drawbacks of the probability model of cipher are limitations on the power of sets of plaintexts, keys and ciphertexts we also study the problem of construction of substitution cipher with unbounded key on a given set of ciphervalues, a set of keys and a probability distribution on the set of keys.
Keywords
Full Text
##article.viewOnOriginalSite##About the authors
Sergey M Ratseev
Ulyanovsk State University
Email: RatseevSM@mail.ru
(Cand. Phys. & Math. Sci.), Associate Professor, Dept. of Information Security & Control Theory 42, L. Tolstoy st., Ulyanovsk, 432017, Russian Federation
References
- А. П. Алферов, А. Ю. Зубов, А. С. Кузьмин, А. В. Черемушкин, Основы криптографии, М.: Гелиос, АРВ, 2005. 480 с.
- C. E. Shannon, “Communication Theory of Secrecy Systems” // Bell System Technical Journal, 1949. vol. 28, no. 4. pp. 656-715. doi: 10.1002/j.1538-7305.1949.tb00928.x.
- К. Шеннон, “Теория связи в секретных системах” / Работы по теории информации и кибернетике, М.: Иностранная литература, 1963. С. 333-369.
- С. М. Рацеев, “О совершенных имитостойких шифрах” // ПДМ, 2012. No 3. С. 41-46.
- А. Ю. Зубов, Криптографические методы защиты информации. Совершенные шифры, М.: Гелиос, АРВ, 2005. 192 с.
- С. М. Рацеев, “Об оптимальных кодах аутентификации” // Системы и средства информ., 2013. Т. 23, No 1, «Проблемы информационной безопасности и надежности систем информатики». С. 53-57.
Supplementary files

