27.10.2013 Views

Communication Theory of Secrecy Systems - Network Research Lab

Communication Theory of Secrecy Systems - Network Research Lab

Communication Theory of Secrecy Systems - Network Research Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Both <strong>of</strong> these may be simple operations on their arguments without the third<br />

equation<br />

K = h(M, E)<br />

being simple.<br />

We may also point out that in investigating a new type <strong>of</strong> ciphering system<br />

one <strong>of</strong> the best methods <strong>of</strong> attack is to consider how the key could be<br />

determined if a sufficient amount <strong>of</strong> M and E were given.<br />

The principle <strong>of</strong> confusion can be (and must be) used to create difficulties<br />

for the cryptanalyst using probable word techniques. Given (or assuming)<br />

M = m1, m2, · · · , ms and E = e1, e2, · · · , es, the cryptanalyst can set up<br />

equations for the different key elements k1, k2, · · · , kr (namely the enciphering<br />

equations).<br />

e1 = f1(m1, m2, · · · , ms; k1, · · · , kr)<br />

e1 = f2(m1, m2, · · · , ms; k1, · · · , kr)<br />

.<br />

.<br />

.<br />

.<br />

e1 = fs(m1, m2, · · · , ms; k1, · · · , kr)<br />

All is known, we assume, except the ki. Each <strong>of</strong> these equations should therefore<br />

be complex in the ki, and involve many <strong>of</strong> them. Otherwise the enemy<br />

can solve the simple ones and then the more complex ones by substitution.<br />

From the point <strong>of</strong> view <strong>of</strong> increasing confusion, it is desirable to have<br />

the fi involve several mi, especially if these are not adjacent and hence less<br />

correlated. This introduces the undesirable feature <strong>of</strong> error propagation, however,<br />

for then each ei will generally affect several mi in deciphering, and an<br />

error will spread to all these.<br />

We conclude that much <strong>of</strong> the key should be used in an involved manner<br />

in obtaining any cryptogram letter from the message to keep the work characteristic<br />

high. Further a dependence on several uncorrelated mi is desirable,<br />

if some propagation <strong>of</strong> error can be tolerated. We are led by all three <strong>of</strong> the<br />

arguments <strong>of</strong> these sections to consider “mixing transformations”.<br />

25 MIXING TRANSFORMATIONS<br />

A notion that has proved valuable in certain branches <strong>of</strong> probability theory<br />

is the concept <strong>of</strong> a mixing transformation. Suppose we have a probability or<br />

measure space Ω and a measure preserving transformation F <strong>of</strong> the space<br />

into itself, that is, a transformation such that the measure <strong>of</strong> a transformed<br />

711

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!