A Proposed Security Evaluator for Cryptosystem Based on Information Theory and Triangular Game
Title | A Proposed Security Evaluator for Cryptosystem Based on Information Theory and Triangular Game |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Sadkhan, S. B., Reda, D. M. |
Conference Name | 2018 International Conference on Advanced Science and Engineering (ICOASE) |
ISBN Number | 978-1-5386-6696-8 |
Keywords | Ciphers, Collaboration, composability, cryptography, cryptosystem, cryptosystem security, Entropy, game theory, Games, Human Behavior, human factors, information theoretic security, Information theory, Mathematical model, Metrics, policy-based governance, pubcrawl, resilience, Resiliency, Scalability, security evaluation, security evaluator, triangular game |
Abstract | The purpose of this research is to propose a new mathematical model, designed to evaluate the security of cryptosystems. This model is a mixture of ideas from two basic mathematical theories, information theory and game theory. The role of information theory is assigning the model with security criteria of the cryptosystems. The role of game theory was to produce the value of the game which is representing the outcome of these criteria, which finally refers to cryptosystem's security. The proposed model support an accurate and mathematical way to evaluate the security of cryptosystems by unifying the criteria resulted from information theory and produce a unique reasonable value. |
URL | https://ieeexplore.ieee.org/document/8548830 |
DOI | 10.1109/ICOASE.2018.8548830 |
Citation Key | sadkhan_proposed_2018 |
- information theoretic security
- triangular game
- security evaluator
- Security Evaluation
- Scalability
- Resiliency
- resilience
- pubcrawl
- policy-based governance
- Metrics
- Mathematical model
- information theory
- Ciphers
- Human Factors
- Human behavior
- Games
- game theory
- Entropy
- cryptosystem security
- cryptosystem
- Cryptography
- composability
- collaboration