Guesswork forms the mathematical framework for quantifying computational security subject to brute-force determination by query. In this paper, we consider guesswork subject to a per-symbol Shannon entropy budget. We introduce inscrutability rate to quantify the asymptotic difficulty of guessing U out of V secret strings drawn from the string-source and prove that the inscrutability rate of any string-source supported on a finite alphabet X, if it exists, lies between the per-symbol Shannon entropy constraint and log |X|. We show that for a stationary string-source, the inscrutability rate of guessing any fraction (1 - ϵ) of the V strings for any fixed ϵ > 0, as V grows, approaches the per-symbol Shannon entropy constraint (whic...
Shannon entropy is often considered as a measure of uncertainty. It is commonly believed that entro...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
More and more effort is being spent on security improvements in today's computer environments, with ...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
The guesswork problem was originally motivated by a desire to quantify computational security for si...
We consider an abstraction of computational security in password protected systems where a user draw...
The Guesswork problem was originally motivated by a desire to quantify computational security for si...
We discuss measures of statistical uncertainty relevant to determining random values in cryptology. ...
Cataloged from PDF version of article.The Shannon theory of cipher systems is combined with recent ...
The Shannon theory of cipher systems is combined with recent work on guessing values of random varia...
How hard is it to guess a password? Massey showed that a simple function of the Shannon entropy of ...
The Shannon cipher system is studied in the context of general sources using a notion of computation...
The Shannon cipher system is studied in the context of general sources using a notion of computation...
Shannon entropy is often considered as a measure of uncertainty. It is commonly believed that entro...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
More and more effort is being spent on security improvements in today's computer environments, with ...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
The guesswork problem was originally motivated by a desire to quantify computational security for si...
We consider an abstraction of computational security in password protected systems where a user draw...
The Guesswork problem was originally motivated by a desire to quantify computational security for si...
We discuss measures of statistical uncertainty relevant to determining random values in cryptology. ...
Cataloged from PDF version of article.The Shannon theory of cipher systems is combined with recent ...
The Shannon theory of cipher systems is combined with recent work on guessing values of random varia...
How hard is it to guess a password? Massey showed that a simple function of the Shannon entropy of ...
The Shannon cipher system is studied in the context of general sources using a notion of computation...
The Shannon cipher system is studied in the context of general sources using a notion of computation...
Shannon entropy is often considered as a measure of uncertainty. It is commonly believed that entro...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
More and more effort is being spent on security improvements in today's computer environments, with ...