July 20, 2023, 1:10 a.m. | Boris Ryabko

cs.CR updates on arXiv.org arxiv.org

Perfect ciphers have been a very attractive cryptographic tool ever since C.
Shannon described them. Note that, by definition, if a perfect cipher is used,
no one can get any information about the encrypted message without knowing the
secret key. We consider the problem of reducing the key length of perfect
ciphers, because in many applications the length of the secret key is a crucial
parameter. This paper describes a simple method of key length reduction. This
method gives a …

cipher ciphers compression data data compression definition encrypted information key length message perfect secret secret key tool

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Lead Technical Product Manager - Threat Protection

@ Mastercard | Remote - United Kingdom

Data Privacy Officer

@ Banco Popular | San Juan, PR

GRC Security Program Manager

@ Meta | Bellevue, WA | Menlo Park, CA | Washington, DC | New York City

Cyber Security Engineer

@ ASSYSTEM | Warrington, United Kingdom

Privacy Engineer, Technical Audit

@ Meta | Menlo Park, CA