Communication theory of secrecy systems

  title={Communication theory of secrecy systems},
  author={C. Shannon},
  journal={Bell Syst. Tech. J.},
  • C. Shannon
  • Published 1949
  • Mathematics, Computer Science
  • Bell Syst. Tech. J.
  • THE problems of cryptography and secrecy systems furnish an interesting application of communication theory.1 In this paper a theory of secrecy systems is developed. The approach is on a theoretical level and is intended to complement the treatment found in standard works on cryptography.2 There, a detailed study is made of the many standard types of codes and ciphers, and of the ways of breaking them. We will be more concerned with the general mathematical structure and properties of secrecy… CONTINUE READING
    7,282 Citations
    Towards Combining Shannon's Theory on Secrecy Systems and the Theory of Authentication in the Case of Multiple Channel Use
    • B. Smeets
    • Computer Science
    • Proceedings. IEEE International Symposium on Information Theory
    • 1993
    Information-theoretic Cryptography
    • PDF
    A Construction of Authentication Codes with Secrecy
    • 2
    The combinatorics of authentication and secrecy codes
    • D. Stinson
    • Mathematics, Computer Science
    • Journal of Cryptology
    • 2005
    • 67
    Authentication / Secrecy Codes
    Bounds and Constructions for Authentication-Secrecy Codes with Splitting
    • M. Soete
    • Mathematics, Computer Science
    • CRYPTO
    • 1988
    • 11
    • PDF
    Perfect Secrecy System Based on Chaotic Key Generator
    • 1
    • Highly Influenced


    Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications
    • G. S. Vernam
    • Engineering
    • Transactions of the American Institute of Electrical Engineers
    • 1926
    • 369
    Cryptography in An Algebraic Alphabet
    • 197
    • PDF