Guesswork Subject to a Total Entropy Budget

12/25/2017
by   Arman Rezaee, et al.
0

We consider an abstraction of computational security in password protected systems where a user draws a secret string of given length with i.i.d. characters from a finite alphabet, and an adversary would like to identify the secret string by querying, or guessing, the identity of the string. The concept of a "total entropy budget" on the chosen word by the user is natural, otherwise the chosen password would have arbitrary length and complexity. One intuitively expects that a password chosen from the uniform distribution is more secure. This is not the case, however, if we are considering only the average guesswork of the adversary when the user is subject to a total entropy budget. The optimality of the uniform distribution for the user's secret string holds when we have also a budget on the guessing adversary. We suppose that the user is subject to a "total entropy budget" for choosing the secret string, whereas the computational capability of the adversary is determined by his "total guesswork budget." We study the regime where the adversary's chances are exponentially small in guessing the secret string chosen subject to a total entropy budget. We introduce a certain notion of uniformity and show that a more uniform source will provide better protection against the adversary in terms of his chances of success in guessing the secret string. In contrast, the average number of queries that it takes the adversary to identify the secret string is smaller for the more uniform secret string subject to the same total entropy budget.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/17/2019

Non-Malleable Secret Sharing against Affine Tampering

Non-malleable secret sharing was recently studied by Goyal and Kumar in ...
research
06/02/2021

Counting Lyndon Subsequences

Counting substrings/subsequences that preserve some property (e.g., pali...
research
12/28/2017

On the Decision Tree Complexity of String Matching

String matching is one of the most fundamental problems in computer scie...
research
03/14/2019

Wiretap Secret Key Capacity of Tree-PIN

Secret key agreement (SKA) is an essential primitive in cryptography and...
research
07/26/2019

Attack Synthesis for Strings using Meta-Heuristics

Information leaks are a significant problem in modern computer systems a...
research
02/13/2020

Conditional Disclosure of Secrets: A Noise and Signal Alignment Approach

In the conditional disclosure of secrets (CDS) problem, Alice and Bob (e...
research
11/24/2019

An Iterative Security Game for Computing Robust and Adaptive Network Flows

The recent advancement in cyberphysical systems has led to an exponentia...

Please sign up or login with your details

Forgot password? Click here to reset