Prikladnaya Diskretnaya Matematika. Supplement
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat. Suppl.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika. Supplement, 2021, Issue 14, Pages 91–95
DOI: https://doi.org/10.17223/2226308X/14/20
(Mi pdma539)
 

This article is cited in 1 scientific paper (total in 1 paper)

Mathematical Methods of Cryptography

To the task of description minimal by inclusion perfect ciphers

N. V. Medvedeva, S. S. Titov

Urals State University of Railway Transport, Ekaterinburg
Full-text PDF (995 kB) Citations (1)
References:
Abstract: This work is dealing with the problem of description Shannon perfect ciphers (which are absolutely immune against the attack on ciphertext, according to Shannon), minimal by inclusion. A graph approach to the description of perfect ciphers and their modern analogues and generalizations is proposed. The equivalence graph of the keys of the cipher is defined. Key equivalence refers to the following: two different keys are equivalent in cipher-value $x_i$, if the cipher-value $x_i$ on these keys is encrypted to the same code designation. In this case, pairwise different keys $k_1, k_2, k_3,\ldots , k_{n-1}, k_n$ form a cycle of length $n$, if there is such a sequence of cipher-values that: 1) the neighboring cipher-values are different; 2) the keys $k_1, k_2, k_3,\ldots , k_{n-1}, k_n, k_1$ are sequentially equivalent in the corresponding cipher-values. If $n$ is an odd number, then the keys $k_1, k_2,\ldots , k_n$ form an odd-length cycle. A sufficient minimum inclusion condition of the cipher has been proven: let some inhomogeneously connected component of the equivalence graph of the keys of the cipher have an odd-length cycle, then the cipher is minimal by inclusion. Examples are given to illustrate the effectiveness of the proposed approach. The results can be used to study almost-perfect ciphers.
Keywords: perfect ciphers, endomorphic ciphers, non-endomorphic ciphers.
Document Type: Article
UDC: 512.64, 519.21, 519.72
Language: Russian
Citation: N. V. Medvedeva, S. S. Titov, “To the task of description minimal by inclusion perfect ciphers”, Prikl. Diskr. Mat. Suppl., 2021, no. 14, 91–95
Citation in format AMSBIB
\Bibitem{MedTit21}
\by N.~V.~Medvedeva, S.~S.~Titov
\paper To the task of description minimal by inclusion perfect ciphers
\jour Prikl. Diskr. Mat. Suppl.
\yr 2021
\issue 14
\pages 91--95
\mathnet{http://mi.mathnet.ru/pdma539}
\crossref{https://doi.org/10.17223/2226308X/14/20}
Linking options:
  • https://www.mathnet.ru/eng/pdma539
  • https://www.mathnet.ru/eng/pdma/y2021/i14/p91
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Prikladnaya Diskretnaya Matematika. Supplement
    Statistics & downloads:
    Abstract page:89
    Full-text PDF :40
    References:17
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024