Guesswork forms the mathematical framework for quantifying computational security subject to brute-force determination by query. In this paper, we consider guesswork subject to a per-symbol Shannon entropy budget. We introduce inscrutability rate as the asymptotic rate of increase in the exponential number of guesses required of an adversary to determine one or more secret strings. We prove that the inscrutability rate of any string-source supported on a finite alphabet χ, if it exists, lies between the per-symbol Shannon entropy constraint and log |χ|. We further prove that the inscrutability rate of any finite-order Markov string-source with hidden statistics remains the same as the unhidden case, i.e., the asymptotic value of hiding the ...
More and more effort is being spent on security improvements in today's computer environments, with ...
Shannon entropy is often considered as a measure of uncertainty. It is commonly believed that entro...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-...
We consider an abstraction of computational security in password protected systems where a user draw...
The guesswork problem was originally motivated by a desire to quantify computational security for si...
The Guesswork problem was originally motivated by a desire to quantify computational security for si...
We discuss measures of statistical uncertainty relevant to determining random values in cryptology. ...
The Shannon cipher system is studied in the context of general sources using a notion of computation...
The Shannon theory of cipher systems is combined with recent work on guessing values of random varia...
The Shannon cipher system is studied in the context of general sources using a notion of computation...
Cataloged from PDF version of article.The Shannon theory of cipher systems is combined with recent ...
How hard is it to guess a password? Massey showed that a simple function of the Shannon entropy of ...
More and more effort is being spent on security improvements in today's computer environments, with ...
Shannon entropy is often considered as a measure of uncertainty. It is commonly believed that entro...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-...
We consider an abstraction of computational security in password protected systems where a user draw...
The guesswork problem was originally motivated by a desire to quantify computational security for si...
The Guesswork problem was originally motivated by a desire to quantify computational security for si...
We discuss measures of statistical uncertainty relevant to determining random values in cryptology. ...
The Shannon cipher system is studied in the context of general sources using a notion of computation...
The Shannon theory of cipher systems is combined with recent work on guessing values of random varia...
The Shannon cipher system is studied in the context of general sources using a notion of computation...
Cataloged from PDF version of article.The Shannon theory of cipher systems is combined with recent ...
How hard is it to guess a password? Massey showed that a simple function of the Shannon entropy of ...
More and more effort is being spent on security improvements in today's computer environments, with ...
Shannon entropy is often considered as a measure of uncertainty. It is commonly believed that entro...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...