Please use this identifier to cite or link to this item:
http://localhost:8081/xmlui/handle/123456789/13749
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Singh, Balbir | - |
dc.date.accessioned | 2014-12-09T05:50:34Z | - |
dc.date.available | 2014-12-09T05:50:34Z | - |
dc.date.issued | 2003 | - |
dc.identifier | M.Tech | en_US |
dc.identifier.uri | http://hdl.handle.net/123456789/13749 | - |
dc.guide | Kumar, Munish | - |
dc.guide | Pillai, N. Rajesh | - |
dc.description.abstract | The security of many cryptographic systems depends upon the generation of unpredictable quantities. Examples include the secret key in the DES encryption algorithm the primes p, q in the RSA encryption and digital signature schemes, the private key an in the DSA, and the challenges used in challenge-response identification systems[1]. In all these cases, the quantities generated must be of sufficient size and be "random" in the sense that the probability of any particular value being selected must be sufficiently small to preclude an adversary from gaining advantage through optimizing a search strategy based on such probability. For example, the key space for DES has size 2'G. If a secret key k were selected using a true random generator, an adversary would on average have to try 255 possible keys before guessing the correct key k. If, on the other hand, a key k were selected by first choosing a16-bit random secret s, and then expanding it into a 56-bit key k using a complicated but publicly known function f, the adversary would on average only need to try 2' possible keys (obtained by running every possible value for s through the function). Prediction is important in communication, control, forecasting, investment, molecular biology, security, and other areas. We understand how to do optimal prediction when the data model is known, but there is a need for designing universal prediction algorithms that will perform well no matter what the underlying probabilistic model is. Universal prediction was subject of extensive research over the last 50 years; it dates back to Shannon | en_US |
dc.language.iso | en | en_US |
dc.subject | CDAC | en_US |
dc.subject | STUDY -SYMBOL PREDICTOR ALGORITHMS | en_US |
dc.subject | NEXT BIT ALGORITHMS | en_US |
dc.subject | CRYPTOLOGICAL APPLICATIONS | en_US |
dc.title | STUDY OF NEXT BIT/SYMBOL PREDICTOR ALGORITHMS FOR CRYPTOLOGICAL APPLICATIONS | en_US |
dc.type | M.Tech Dessertation | en_US |
dc.accession.number | G11102 | en_US |
Appears in Collections: | MASTERS' THESES (C.Dec.) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ERDCIG11102.pdf | 2.3 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.