Communication Theory of Secrecy Systems - Network Research Lab
Communication Theory of Secrecy Systems - Network Research Lab
Communication Theory of Secrecy Systems - Network Research Lab
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Both <strong>of</strong> these may be simple operations on their arguments without the third<br />
equation<br />
K = h(M, E)<br />
being simple.<br />
We may also point out that in investigating a new type <strong>of</strong> ciphering system<br />
one <strong>of</strong> the best methods <strong>of</strong> attack is to consider how the key could be<br />
determined if a sufficient amount <strong>of</strong> M and E were given.<br />
The principle <strong>of</strong> confusion can be (and must be) used to create difficulties<br />
for the cryptanalyst using probable word techniques. Given (or assuming)<br />
M = m1, m2, · · · , ms and E = e1, e2, · · · , es, the cryptanalyst can set up<br />
equations for the different key elements k1, k2, · · · , kr (namely the enciphering<br />
equations).<br />
e1 = f1(m1, m2, · · · , ms; k1, · · · , kr)<br />
e1 = f2(m1, m2, · · · , ms; k1, · · · , kr)<br />
.<br />
.<br />
.<br />
.<br />
e1 = fs(m1, m2, · · · , ms; k1, · · · , kr)<br />
All is known, we assume, except the ki. Each <strong>of</strong> these equations should therefore<br />
be complex in the ki, and involve many <strong>of</strong> them. Otherwise the enemy<br />
can solve the simple ones and then the more complex ones by substitution.<br />
From the point <strong>of</strong> view <strong>of</strong> increasing confusion, it is desirable to have<br />
the fi involve several mi, especially if these are not adjacent and hence less<br />
correlated. This introduces the undesirable feature <strong>of</strong> error propagation, however,<br />
for then each ei will generally affect several mi in deciphering, and an<br />
error will spread to all these.<br />
We conclude that much <strong>of</strong> the key should be used in an involved manner<br />
in obtaining any cryptogram letter from the message to keep the work characteristic<br />
high. Further a dependence on several uncorrelated mi is desirable,<br />
if some propagation <strong>of</strong> error can be tolerated. We are led by all three <strong>of</strong> the<br />
arguments <strong>of</strong> these sections to consider “mixing transformations”.<br />
25 MIXING TRANSFORMATIONS<br />
A notion that has proved valuable in certain branches <strong>of</strong> probability theory<br />
is the concept <strong>of</strong> a mixing transformation. Suppose we have a probability or<br />
measure space Ω and a measure preserving transformation F <strong>of</strong> the space<br />
into itself, that is, a transformation such that the measure <strong>of</strong> a transformed<br />
711