Show simple item record

dc.contributor.authorBeirami, Ahmad
dc.contributor.authorCalderbank, Robert
dc.contributor.authorDuffy, Ken
dc.contributor.authorMedard, Muriel
dc.date.accessioned2018-04-09T17:27:06Z
dc.date.available2018-04-09T17:27:06Z
dc.date.issued2016-06
dc.identifier.isbn978-1-4673-7704-1
dc.identifier.urihttp://hdl.handle.net/1721.1/114630
dc.description.abstractGuesswork forms the mathematical framework for quantifying computational security subject to brute-force determination by query. In this paper, we consider guesswork subject to a per-symbol Shannon entropy budget. We introduce inscrutability rate to quantify the asymptotic difficulty of guessing U out of V secret strings drawn from the string-source and prove that the inscrutability rate of any string-source supported on a finite alphabet X , if it exists, lies between the per-symbol Shannon entropy constraint and log |X|. We show that for a stationary string-source, the inscrutability rate of guessing any fraction (1 - ε) of the V strings for any fixed ε > 0, as V grows, approaches the per-symbol Shannon entropy constraint (which is equal to the Shannon entropy rate for the stationary string-source). This corresponds to the minimum inscrutability rate among all string-sources with the same per-symbol Shannon entropy. We further prove that the inscrutability rate of any finite-order Markov string-source with hidden statistics remains the same as the unhidden case, i.e., the asymptotic value of hiding the statistics per each symbol is vanishing. On the other hand, we show that there exists a string-source that achieves the upper limit on the inscrutability rate, i.e., log |X|, under the same Shannon entropy budget. Index Terms—Brute-force attack; Guesswork; Inscrutability; Renyi entropy; Universal methods; Large deviationsen_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/ISIT.2015.7282958en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceOther repositoryen_US
dc.titleQuantifying computational security subject to source constraints, guesswork and inscrutabilityen_US
dc.typeArticleen_US
dc.identifier.citationBeirami, Ahmad, et al. "Quantifying Computational Security Subject to Source Constraints, Guesswork and Inscrutability." 2015 IEEE International Symposium on Information Theory (ISIT), 14-19 June, 2015, Hong Kong, China, IEEE, 2015, pp. 2757–61.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorMedard, Muriel
dc.relation.journal2015 IEEE International Symposium on Information Theory (ISIT)en_US
dc.eprint.versionOriginal manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsBeirami, Ahmad; Calderbank, Robert; Duffy, Ken; Medard, Murielen_US
dspace.embargo.termsNen_US
dc.identifier.orcidhttps://orcid.org/0000-0003-4059-407X
mit.licenseOPEN_ACCESS_POLICYen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record