Visible to the public Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory

TitleBest Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory
Publication TypeConference Paper
Year of Publication2018
AuthorsSadkhan, Sattar B., Reda, Dhilal M.
Conference Name2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)
KeywordsBrute Force Attack, brute force attacks, Ciphers, Ciphertext, Collaboration, Crypto-System, cryptographer, cryptography, cryptosystem key, game theory, Games, human factors, Information theory, key space, Mathematical model, plaintext, policy-based governance, pubcrawl, security evaluation
AbstractOne of the most important strength features of crypto-system's is the key space. As a result, whenever the system has more key space, it will be more resistant to attack. The weakest type of attack on the key space is Brute Force attack, which tests all the keys on the ciphertext in order to get the plaintext. But there are several strategies that can be considered by the attacker and cryptographer related to the selection of the right key with the lowest cost (time). Game theory is a mathematical theory that draws the best strategies for most problems. This research propose a new evaluation method which is employing game theory to draw best strategies for both players (cryptographer & attacker).
DOI10.1109/NTCCIT.2018.8681178
Citation Keysadkhan_best_2018