2020
DOI: 10.1088/1757-899x/862/5/052032
|View full text |Cite
|
Sign up to set email alerts
|

Asymptotic secrecy of the information protection by the usage of simple integer splitting method

Abstract: The integer splitting method is a special method that is used to encrypt the text. In this method, each text character is represented as an integer in accordance with the selected code table after that this integer is replaced on the base of another number with a sequence of k integers (k-splitting level) and this is performed by the usage of modular arithmetic. This article studies the property of asymptotic secrecy of the simple integer splitting method when it is used in the field of cryptography; the resea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Of all the attempts to restore the plaintext M , only one case will give a meaningful plaintext that matches what is encrypted by the sender. This is a situation where the selected keys on the attacker's side match the same keys that were used by the sender during the encryption process of the plaintext [6,8]. So, this leads to the fact that the number of correct extractions of a meaningful text, which meets the plaintext, is equal to one.…”
Section: Consider the Event Pr ( | 1)mentioning
confidence: 99%
See 1 more Smart Citation
“…Of all the attempts to restore the plaintext M , only one case will give a meaningful plaintext that matches what is encrypted by the sender. This is a situation where the selected keys on the attacker's side match the same keys that were used by the sender during the encryption process of the plaintext [6,8]. So, this leads to the fact that the number of correct extractions of a meaningful text, which meets the plaintext, is equal to one.…”
Section: Consider the Event Pr ( | 1)mentioning
confidence: 99%
“…As discussed previously, only one case will produce a meaningful plaintext that matches what is encrypted by the sender. This is a case when the selected gammas on the attacker's side match the same gammas that are used by the sender's side when encrypting the plaintext [6,8]. So…”
Section: Substituting the Values 2 N Andmentioning
confidence: 99%