Statistical Analysis of DH1 Cryptosystem
In this paper we shall use some standard statistical methods to test the avalanche effect of a previously introduced cryptosystem based on automata compositions, called DH1 cryptosystem. We have generated sample data of encryption and decryption. In our first set of analysis we simply estimated the...
Saved in:
Published in | Acta cybernetica (Szeged) Vol. 23; no. 1; pp. 371 - 378 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Szeged
Laszlo Nyul
2017
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In this paper we shall use some standard statistical methods to test the avalanche effect of a previously introduced cryptosystem based on automata compositions, called DH1 cryptosystem. We have generated sample data of encryption and decryption. In our first set of analysis we simply estimated the probabilities of the atoms of the discrete distribution separately in order to compare them with those of the binomial test distribution. In the second statistical analysis, we turned to a goodness-of-fit test. For this we used the χ2-test. Thirdly, we assumed that the sample comes from a binomial distribution and we calculated the maximum likelihood estimation of the two parameters. Finally we discuss some well-known further tests on randomness and related results. Our main conclusions based on the statistics all confirm that the avalanche effect is fulfilled. |
---|---|
AbstractList | In this paper we shall use some standard statistical methods to test the avalanche effect of a previously introduced cryptosystem based on automata compositions, called DH1 cryptosystem. We have generated sample data of encryption and decryption. In our first set of analysis we simply estimated the probabilities of the atoms of the discrete distribution separately in order to compare them with those of the binomial test distribution. In the second statistical analysis, we turned to a goodness-of-fit test. For this we used the χ2-test. Thirdly, we assumed that the sample comes from a binomial distribution and we calculated the maximum likelihood estimation of the two parameters. Finally we discuss some well-known further tests on randomness and related results. Our main conclusions based on the statistics all confirm that the avalanche effect is fulfilled. |
Author | Gáll, József Horváth, Géza Dömösi, Pál Tihanyi, Norbert |
Author_xml | – sequence: 1 givenname: Pál surname: Dömösi fullname: Dömösi, Pál – sequence: 2 givenname: József surname: Gáll fullname: Gáll, József – sequence: 3 givenname: Géza surname: Horváth fullname: Horváth, Géza – sequence: 4 givenname: Norbert surname: Tihanyi fullname: Tihanyi, Norbert |
BookMark | eNotkD1PwzAQhj0UiVL6E5AisbAk-PyZjFX5KFIlBkBis2zHllKlSbDdIf8eQ3vDe8vznk7PDVoM4-AQugNcASOUPGqbtJ1NRWgFFcEgcyzQElPCSkng-xqtYzzgPFwwoGKJHj6STl1MndV9sRl0P8cuFqMvnnZQbMM8pTHOMbnjLbryuo9ufdkr9PXy_Lndlfv317ftZl9aUkMqjfDANRHGCNx4J2uitZeCesywaZkmTeupy6itG2G8AGk9yJZbQ7GmGNMVuj_fncL4c3IxqcN4CvmxqAitGZfAscgUP1M2jDEG59UUuqMOswKs_l2oi4vcUqD-XOSgv6lUVoA |
CitedBy_id | crossref_primary_10_1007_s00236_023_00440_w |
ContentType | Journal Article |
Copyright | Copyright Laszlo Nyul Jan 2017 |
Copyright_xml | – notice: Copyright Laszlo Nyul Jan 2017 |
DBID | AAYXX CITATION 3V. 7RQ 7XB 8FE 8FG 8FK ABJCF ABUWG AFKRA BENPR BGLVJ BYOGL CCPQU DWQXO HCIFZ L6V M7S PQEST PQQKQ PQUKI PRINS PTHSS Q9U U9A |
DOI | 10.14232/actacyb.23.1.2017.20 |
DatabaseName | CrossRef ProQuest Central (Corporate) Career and Technical Education (ProQuest Database) ProQuest Central (purchase pre-March 2016) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central ProQuest Central Technology Collection ProQuest East Europe, Central Europe Database ProQuest One Community College ProQuest Central SciTech Premium Collection (Proquest) (PQ_SDU_P3) ProQuest Engineering Collection Engineering Database ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection ProQuest Central Basic |
DatabaseTitle | CrossRef Engineering Database Technology Collection ProQuest Central Basic ProQuest One Academic Eastern Edition East Europe, Central Europe Database ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central ProQuest Career and Technical Education ProQuest Engineering Collection ProQuest One Academic UKI Edition ProQuest Central Korea Materials Science & Engineering Collection ProQuest One Academic ProQuest Central (Alumni) Engineering Collection Career and Technical Education (Alumni Edition) |
DatabaseTitleList | Engineering Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Sciences (General) |
EndPage | 378 |
ExternalDocumentID | 10_14232_actacyb_23_1_2017_20 |
GroupedDBID | 7RQ AAYXX ABJCF ABUWG AFFNX AFKRA ALMA_UNASSIGNED_HOLDINGS ARCSS BENPR BGLVJ BYOGL CCPQU CITATION DWQXO EIS HCIFZ M7S OK1 P2P PTHSS 3V. 7XB 8FE 8FG 8FK L6V PQEST PQQKQ PQUKI PRINS Q9U U9A |
ID | FETCH-LOGICAL-c281t-b6f15a26bb609fe782aaf763f040bd4a29df3e281c896bf617cf17d5cb30a3003 |
IEDL.DBID | BENPR |
ISSN | 0324-721X |
IngestDate | Thu Oct 10 19:30:22 EDT 2024 Fri Aug 23 01:03:46 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c281t-b6f15a26bb609fe782aaf763f040bd4a29df3e281c896bf617cf17d5cb30a3003 |
PQID | 2384571506 |
PQPubID | 4586596 |
PageCount | 8 |
ParticipantIDs | proquest_journals_2384571506 crossref_primary_10_14232_actacyb_23_1_2017_20 |
PublicationCentury | 2000 |
PublicationDate | 2017-00-00 20170101 |
PublicationDateYYYYMMDD | 2017-01-01 |
PublicationDate_xml | – year: 2017 text: 2017-00-00 |
PublicationDecade | 2010 |
PublicationPlace | Szeged |
PublicationPlace_xml | – name: Szeged |
PublicationTitle | Acta cybernetica (Szeged) |
PublicationYear | 2017 |
Publisher | Laszlo Nyul |
Publisher_xml | – name: Laszlo Nyul |
SSID | ssj0000564136 |
Score | 2.076546 |
Snippet | In this paper we shall use some standard statistical methods to test the avalanche effect of a previously introduced cryptosystem based on automata... |
SourceID | proquest crossref |
SourceType | Aggregation Database |
StartPage | 371 |
SubjectTerms | Avalanches Binomial distribution Chi-square test Encryption Goodness of fit Maximum likelihood estimation Parameter estimation Statistical analysis Statistical methods Statistical tests |
Title | Statistical Analysis of DH1 Cryptosystem |
URI | https://www.proquest.com/docview/2384571506 |
Volume | 23 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV07T8MwED7RdmFBlId4lCoDQxmcJk7iOBPi0YcQFISoVKbIdnxjU9ow9N9jNy6PhSUZYkXKXe6-e9jfAVzSUDCOiSYCZUZi5Ei4YpRgqnQRcBFQtAecnyZsPI0fZsnMFdxWblvl1iduHHVRKlsj7xtoiZPU8uFdLz6InRplu6tuhEYDWtRkCkETWreDycvrd5XFwLvx0nXDksbEpDszd4zHNij7QlVCraVPI9_mimHq27nfvwHqr3_egM5wH_ZctOjd1Optw46eH0Db2ePK6znS6KtD6NmocUO6bNYLxzTilejdj0NPLdeLqqxJm49gOhy83Y2Jm4JAFOVhRSTDMBGUScmCDLVBdCHQeAU05ieLWNCswEibpYpnTKKJSBSGaZEoGQUiMkZ7DM15Odcn4FFZZDEPCsF0FkdCC0SheRBpppIMkZ2Cv_30fFGTXeQ2SbCyyp2schrlYW5lZS6n0NkKKHf__ir_0dTZ_4_PYde-py5odKBZLT_1hYH4SnahwYejrtOmvb8_jx6_AAWjp7U |
link.rule.ids | 315,783,787,4031,12777,21400,27935,27936,27937,33385,33756,43612,43817 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV07T8MwELagDLAgykMUCmRgKIPbxHEcZ0IIKAHaTq3UzbId39iUNgz999iJy2NhyRIrUu5y990j9x1CtySSjENisASVYQocMNeMYEi1KUIuQwJuwHk8YfmMvs2TuS-4rf1vlVufWDvqotSuRj6w0EKT1PHh3S8_sNsa5bqrfoXGLtqjscVqNyk-fPmusVhwtz66aVcSim2yM_dDPK49OZC6knqj-iTuu0wxSvtu6_dvePrrnWvIGR6hQx8rBg-NcttoxyyOUdtb4zroecrouxPUczFjTblsz0vPMxKUEDzlUaBXm2VVNpTNp2g2fJ4-5tjvQMCa8KjCikGUSMKUYmEGxuK5lGB9AljjUwWVJCsgNvao5hlTYOMRDVFaJFrFoYytyZ6h1qJcmHMUEFVklIeFZCajsTQSQBoexobpJANgHdTfvrpYNlQXwqUITlbCy0qQWETCycpeOqi7FZDwX_5a_Ojp4v_bN2g_n45HYvQ6eb9EB-6ZTWmji1rV6tNcWbCv1HWt0S_6qqa6 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Statistical+Analysis+of+DH1+Cryptosystem&rft.jtitle=Acta+cybernetica+%28Szeged%29&rft.au=D%C3%B6m%C3%B6si%2C+P%C3%A1l&rft.au=G%C3%A1ll%2C+J%C3%B3zsef&rft.au=Horv%C3%A1th%2C+G%C3%A9za&rft.au=Tihanyi%2C+Norbert&rft.date=2017&rft.issn=0324-721X&rft.volume=23&rft.issue=1&rft.spage=371&rft.epage=378&rft_id=info:doi/10.14232%2Factacyb.23.1.2017.20&rft.externalDBID=n%2Fa&rft.externalDocID=10_14232_actacyb_23_1_2017_20 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0324-721X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0324-721X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0324-721X&client=summon |