Skip to main content

An Introduction to the Theory of Unconditional Secrecy and Authentication

  • Chapter
Geometries, Codes and Cryptography

Part of the book series: International Centre for Mechanical Sciences ((CISM,volume 313))

Abstract

A few insecure ciphers, a seemingly secure cipher and a provably secure ciphers are described to illustrate the basic points in Shannon-theoretic cryptography. Lower bounds for authentication codes in Simmons’ authentication theory are given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C. A. Shannon, Communication theory of secrecy systems, Bell Syst. Tech. J., vol. 28, Oct. 1949, pp. 656–715

    Article  MATH  MathSciNet  Google Scholar 

  2. A. Sgarro, Equivocations for homophonic ciphers, in Advances in cryptology, ed. by Th.Bet, N.Cot and I.Ingemarsson, Lecture Notes in Computer Science 209, Springer Verlag, 1985, pp. 51–61

    Google Scholar 

  3. J. L. Massey, An introduction to contemporary cryptology, Proceedings of the IEEE, May 1988, pp. 533–549

    Google Scholar 

  4. Ch. G. Günther A universal algorithm for homophonic coding, in Advances in Cryptology — EUROCRYPT 88, ed. by Ch.G.Günther, Lecture Notes in Computer Science 330, Springer Verlag, 1988, pp. 405–414

    Google Scholar 

  5. H. N. Jendal, Y. J. B. Kuhn, J. L. Massey, An information-theoretic analysis of Günther’s homophonic substitution scheme,Proceedings of Eurocrypt 89, to be published by Springer Verlag

    Google Scholar 

  6. R. J. Blom, Bounds on key equivocation for simple substitution ciphers, IEEE Trans. Info. Th., vol. IT 25, Jan. 1979, pp. 8–18

    Article  MATH  MathSciNet  Google Scholar 

  7. J. G. Dunham, Bounds on message equivocations for simple substitution ciphers, IEEE Trans. Info. Th., vol. IT 26, Sept. 1988, pp. 522–527

    Article  MathSciNet  Google Scholar 

  8. A. Sgarro, Error probabilities for simple substitution ciphers, IEEE Trans. Info. Th., vol. IT 29, March 1983, pp. 190–198

    Article  MATH  MathSciNet  Google Scholar 

  9. A. Sgarro, Equivocations for transposition ciphers,Rivista di matematica per le scienze economiche e sociali, Anno 8, Fasc. 2., pp. 107–114

    Google Scholar 

  10. A. Sgarro, Simple substitution ciphers, in Secure digital communications ed. by G. Longo, CISM Courses and Lectures N.279, Springer Verlag, 1983, pp. 61–77

    Google Scholar 

  11. A. Sgarro, Information-theoretic versus decision-theoretic cryptography, Elektrotechnik und Maschinenbau (now: Elektrotechnik und Informationstechnik), Heft 12, Dez. 1987, pp. 562–564

    Google Scholar 

  12. I. Csiszàr, J. Körner, Information theory, Academic Press, 1981

    Google Scholar 

  13. A. Sgarro, Informational divergence bounds for authentication codes, Proceedings of Eurocrypt 89, in press for Springer Verlag

    Google Scholar 

  14. G.J. Simmons, A survey of information authentication, Proceedings of the IEEE, May 1988, pp. 603–620

    Google Scholar 

  15. D.R. Stinson, Some constructions and bounds for authentication codes. Journal of Cryptology, 11 (1988) pp. 37–52

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1990 Springer-Verlag Wien

About this chapter

Cite this chapter

Sgarro, A. (1990). An Introduction to the Theory of Unconditional Secrecy and Authentication. In: Longo, G., Marchi, M., Sgarro, A. (eds) Geometries, Codes and Cryptography. International Centre for Mechanical Sciences, vol 313. Springer, Vienna. https://doi.org/10.1007/978-3-7091-2838-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-2838-1_5

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-211-82205-0

  • Online ISBN: 978-3-7091-2838-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics