Knowledge

Completeness (cryptography)

Source 📝

161:
know the last byte of every 8byte sequence we send (effectively 12.5% of all our data). Finding out 256 plaintext-ciphertext pairs is not hard at all in the internet world, given that standard protocols are used, and standard protocols have standard headers and commands (e.g. "get", "put", "mail from:", etc.) which the attacker can safely guess. On the other hand, if our cipher has this property (and is generally secure in other ways, too), the attacker would need to collect 2 (~10) plaintext-ciphertext pairs to crack the cipher in this way.
25: 193: 160:
of changing. The easiest way to show why this is good is the following: consider that if we changed our 8-byte plaintext's last byte, it would only have any effect on the 8th byte of the ciphertext. This would mean that if the attacker guessed 256 different plaintext-ciphertext pairs, he would always
46: 97: 69: 76: 230: 83: 65: 116: 54: 50: 254: 90: 223: 204: 35: 39: 148:
This is a desirable property to have in an encryption cipher, so that if one bit of the input (
249: 216: 170: 8: 134: 200: 243: 130: 157: 153: 149: 24: 192: 241: 224: 141:if the value of each output bit depends on 53:. Unsourced material may be challenged and 231: 217: 117:Learn how and when to remove this message 199:This cryptography-related article is a 152:) is changed, every bit of the output ( 242: 187: 51:adding citations to reliable sources 18: 13: 14: 266: 191: 66:"Completeness" cryptography 23: 1: 179: 203:. You can help Knowledge by 7: 164: 10: 271: 186: 156:) has an average of 50% 171:Correlation immunity 47:improve this article 255:Cryptography stubs 212: 211: 127: 126: 119: 101: 16:Cryptography term 262: 233: 226: 219: 195: 188: 135:boolean function 122: 115: 111: 108: 102: 100: 59: 27: 19: 270: 269: 265: 264: 263: 261: 260: 259: 240: 239: 238: 237: 184: 182: 176: 167: 123: 112: 106: 103: 60: 58: 44: 28: 17: 12: 11: 5: 268: 258: 257: 252: 236: 235: 228: 221: 213: 210: 209: 196: 181: 178: 174: 173: 166: 163: 137:is said to be 125: 124: 31: 29: 22: 15: 9: 6: 4: 3: 2: 267: 256: 253: 251: 248: 247: 245: 234: 229: 227: 222: 220: 215: 214: 208: 206: 202: 197: 194: 190: 189: 185: 177: 172: 169: 168: 162: 159: 155: 151: 146: 145:input bits. 144: 140: 136: 132: 121: 118: 110: 99: 96: 92: 89: 85: 82: 78: 75: 71: 68: –  67: 63: 62:Find sources: 56: 52: 48: 42: 41: 37: 32:This article 30: 26: 21: 20: 250:Cryptography 205:expanding it 198: 183: 175: 147: 142: 138: 131:cryptography 128: 113: 104: 94: 87: 80: 73: 61: 45:Please help 33: 158:probability 244:Categories 180:References 154:ciphertext 77:newspapers 150:plaintext 107:June 2009 34:does not 165:See also 139:complete 91:scholar 55:removed 40:sources 93:  86:  79:  72:  64:  98:JSTOR 84:books 201:stub 133:, a 70:news 38:any 36:cite 143:all 129:In 49:by 246:: 232:e 225:t 218:v 207:. 120:) 114:( 109:) 105:( 95:· 88:· 81:· 74:· 57:. 43:.

Index


cite
sources
improve this article
adding citations to reliable sources
removed
"Completeness" cryptography
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
cryptography
boolean function
plaintext
ciphertext
probability
Correlation immunity
Stub icon
stub
expanding it
v
t
e
Categories
Cryptography
Cryptography stubs

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.