Information-theoretical analysis of two Shannon's ciphers

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Abstract

We describe generalized running key ciphers and apply them for analysis of two Shannon's methods. In particular, we suggest some estimation of the cipher equivocation and the probability of correct deciphering without key.

Original languageEnglish
Title of host publication2016 15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages129-131
Number of pages3
ISBN (Electronic)9781509042319
DOIs
Publication statusPublished - 9 Dec 2016
Event15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016 - Saint-Petersburg, Russian Federation
Duration: 26 Sep 201629 Sep 2016

Publication series

Name2016 15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016

Conference

Conference15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016
CountryRussian Federation
CitySaint-Petersburg
Period26.09.201629.09.2016

Fingerprint Dive into the research topics of 'Information-theoretical analysis of two Shannon's ciphers'. Together they form a unique fingerprint.

Cite this