Brute force searching, the typical set and Guesswork

Consider the situation where a word is chosen probabilistically from a finite list. If an attacker knows the list and can inquire about each word in turn, then selecting the word via the uniform distribution maximizes the attacker's difficulty, its Guesswork, in identifying the chosen word. It...

Full description

Bibliographic Details
Main Authors: Christiansen, Mark M., Duffy, Ken R., Medard, Muriel, Calmon, Flavio du Pin
Other Authors: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
Format: Article
Language:en_US
Published: Institute of Electrical and Electronics Engineers (IEEE) 2014
Online Access:http://hdl.handle.net/1721.1/90432
https://orcid.org/0000-0003-2912-7972
https://orcid.org/0000-0003-4059-407X
_version_ 1826197548040192000
author Christiansen, Mark M.
Duffy, Ken R.
Medard, Muriel
Calmon, Flavio du Pin
author2 Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
author_facet Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
Christiansen, Mark M.
Duffy, Ken R.
Medard, Muriel
Calmon, Flavio du Pin
author_sort Christiansen, Mark M.
collection MIT
description Consider the situation where a word is chosen probabilistically from a finite list. If an attacker knows the list and can inquire about each word in turn, then selecting the word via the uniform distribution maximizes the attacker's difficulty, its Guesswork, in identifying the chosen word. It is tempting to use this property in cryptanalysis of computationally secure ciphers by assuming coded words are drawn from a source's typical set and so, for all intents and purposes, uniformly distributed within it. By applying recent results on Guesswork, for i.i.d. sources it is this equipartition ansatz that we investigate here. In particular, we demonstrate that the expected Guesswork for a source conditioned to create words in the typical set grows, with word length, at a lower exponential rate than that of the uniform approximation, suggesting use of the approximation is ill-advised.
first_indexed 2024-09-23T10:49:22Z
format Article
id mit-1721.1/90432
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T10:49:22Z
publishDate 2014
publisher Institute of Electrical and Electronics Engineers (IEEE)
record_format dspace
spelling mit-1721.1/904322022-09-30T23:15:27Z Brute force searching, the typical set and Guesswork Christiansen, Mark M. Duffy, Ken R. Medard, Muriel Calmon, Flavio du Pin Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology. Research Laboratory of Electronics Calmon, Flavio du Pin Medard, Muriel Consider the situation where a word is chosen probabilistically from a finite list. If an attacker knows the list and can inquire about each word in turn, then selecting the word via the uniform distribution maximizes the attacker's difficulty, its Guesswork, in identifying the chosen word. It is tempting to use this property in cryptanalysis of computationally secure ciphers by assuming coded words are drawn from a source's typical set and so, for all intents and purposes, uniformly distributed within it. By applying recent results on Guesswork, for i.i.d. sources it is this equipartition ansatz that we investigate here. In particular, we demonstrate that the expected Guesswork for a source conditioned to create words in the typical set grows, with word length, at a lower exponential rate than that of the uniform approximation, suggesting use of the approximation is ill-advised. United States. Dept. of Defense (Air Force Contract FA8721-05-C-0002) 2014-09-29T15:32:41Z 2014-09-29T15:32:41Z 2013-07 Article http://purl.org/eprint/type/ConferencePaper 978-1-4799-0446-4 2157-8095 http://hdl.handle.net/1721.1/90432 Christiansen, Mark M., Ken R. Duffy, Flavio du Pin Calmon, and Muriel Medard. “Brute Force Searching, the Typical Set and Guesswork.” 2013 IEEE International Symposium on Information Theory (July 2013). https://orcid.org/0000-0003-2912-7972 https://orcid.org/0000-0003-4059-407X en_US http://dx.doi.org/10.1109/ISIT.2013.6620428 Proceedings of the 2013 IEEE International Symposium on Information Theory Creative Commons Attribution-Noncommercial-Share Alike http://creativecommons.org/licenses/by-nc-sa/4.0/ application/pdf Institute of Electrical and Electronics Engineers (IEEE) arXiv
spellingShingle Christiansen, Mark M.
Duffy, Ken R.
Medard, Muriel
Calmon, Flavio du Pin
Brute force searching, the typical set and Guesswork
title Brute force searching, the typical set and Guesswork
title_full Brute force searching, the typical set and Guesswork
title_fullStr Brute force searching, the typical set and Guesswork
title_full_unstemmed Brute force searching, the typical set and Guesswork
title_short Brute force searching, the typical set and Guesswork
title_sort brute force searching the typical set and guesswork
url http://hdl.handle.net/1721.1/90432
https://orcid.org/0000-0003-2912-7972
https://orcid.org/0000-0003-4059-407X
work_keys_str_mv AT christiansenmarkm bruteforcesearchingthetypicalsetandguesswork
AT duffykenr bruteforcesearchingthetypicalsetandguesswork
AT medardmuriel bruteforcesearchingthetypicalsetandguesswork
AT calmonflaviodupin bruteforcesearchingthetypicalsetandguesswork