Title | Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Sadkhan, Sattar B., Reda, Dhilal M. |
Conference Name | 2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT) |
Keywords | Brute Force Attack, brute force attacks, Ciphers, Ciphertext, Collaboration, Crypto-System, cryptographer, cryptography, cryptosystem key, game theory, Games, human factors, Information theory, key space, Mathematical model, plaintext, policy-based governance, pubcrawl, security evaluation |
Abstract | One of the most important strength features of crypto-system's is the key space. As a result, whenever the system has more key space, it will be more resistant to attack. The weakest type of attack on the key space is Brute Force attack, which tests all the keys on the ciphertext in order to get the plaintext. But there are several strategies that can be considered by the attacker and cryptographer related to the selection of the right key with the lowest cost (time). Game theory is a mathematical theory that draws the best strategies for most problems. This research propose a new evaluation method which is employing game theory to draw best strategies for both players (cryptographer & attacker). |
DOI | 10.1109/NTCCIT.2018.8681178 |
Citation Key | sadkhan_best_2018 |