Abstract
A few insecure ciphers, a seemingly secure cipher and a provably secure ciphers are described to illustrate the basic points in Shannon-theoretic cryptography. Lower bounds for authentication codes in Simmons’ authentication theory are given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
C. A. Shannon, Communication theory of secrecy systems, Bell Syst. Tech. J., vol. 28, Oct. 1949, pp. 656–715
A. Sgarro, Equivocations for homophonic ciphers, in Advances in cryptology, ed. by Th.Bet, N.Cot and I.Ingemarsson, Lecture Notes in Computer Science 209, Springer Verlag, 1985, pp. 51–61
J. L. Massey, An introduction to contemporary cryptology, Proceedings of the IEEE, May 1988, pp. 533–549
Ch. G. Günther A universal algorithm for homophonic coding, in Advances in Cryptology — EUROCRYPT 88, ed. by Ch.G.Günther, Lecture Notes in Computer Science 330, Springer Verlag, 1988, pp. 405–414
H. N. Jendal, Y. J. B. Kuhn, J. L. Massey, An information-theoretic analysis of Günther’s homophonic substitution scheme,Proceedings of Eurocrypt 89, to be published by Springer Verlag
R. J. Blom, Bounds on key equivocation for simple substitution ciphers, IEEE Trans. Info. Th., vol. IT 25, Jan. 1979, pp. 8–18
J. G. Dunham, Bounds on message equivocations for simple substitution ciphers, IEEE Trans. Info. Th., vol. IT 26, Sept. 1988, pp. 522–527
A. Sgarro, Error probabilities for simple substitution ciphers, IEEE Trans. Info. Th., vol. IT 29, March 1983, pp. 190–198
A. Sgarro, Equivocations for transposition ciphers,Rivista di matematica per le scienze economiche e sociali, Anno 8, Fasc. 2., pp. 107–114
A. Sgarro, Simple substitution ciphers, in Secure digital communications ed. by G. Longo, CISM Courses and Lectures N.279, Springer Verlag, 1983, pp. 61–77
A. Sgarro, Information-theoretic versus decision-theoretic cryptography, Elektrotechnik und Maschinenbau (now: Elektrotechnik und Informationstechnik), Heft 12, Dez. 1987, pp. 562–564
I. Csiszàr, J. Körner, Information theory, Academic Press, 1981
A. Sgarro, Informational divergence bounds for authentication codes, Proceedings of Eurocrypt 89, in press for Springer Verlag
G.J. Simmons, A survey of information authentication, Proceedings of the IEEE, May 1988, pp. 603–620
D.R. Stinson, Some constructions and bounds for authentication codes. Journal of Cryptology, 11 (1988) pp. 37–52
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Wien
About this chapter
Cite this chapter
Sgarro, A. (1990). An Introduction to the Theory of Unconditional Secrecy and Authentication. In: Longo, G., Marchi, M., Sgarro, A. (eds) Geometries, Codes and Cryptography. International Centre for Mechanical Sciences, vol 313. Springer, Vienna. https://doi.org/10.1007/978-3-7091-2838-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-7091-2838-1_5
Publisher Name: Springer, Vienna
Print ISBN: 978-3-211-82205-0
Online ISBN: 978-3-7091-2838-1
eBook Packages: Springer Book Archive