paper

Communication Theory of Secrecy Systems

  • Authors:

📜 Abstract

The problems of cryptography and secrecy systems furnish an interesting application of communication theory. In this paper, a theory of secrecy systems is developed. The approach is axiomatic, and the results may be interpreted as defining the various limitations of attainable security. It is shown that the problems of designing a secrecy system and of breaking it are closely related to the corresponding problems of communication and of statistical inference. In particular, a comparison is made between a secrecy system and a noisy communication channel. In this case the decipherer plays the role of the observer who tries to infer the transmitted message from the compromised version he receives.

✨ Summary

Claude Shannon’s paper “Communication Theory of Secrecy Systems” published in 1949 is considered a foundational work in both cryptography and information theory. It applies the mathematical frameworks of communication theory to the problems presented by cryptographic systems, establishing a relationship between the efficacy of secrecy systems and statistical communication systems.

This work set the stage for future developments in the design and analysis of secure communication. Shannon’s model viewed cryptographic operations as akin to communication over a noisy channel, positioning breaking a cryptographic system as similar to addressing errors in a communication channel. This understanding significantly impacted how cryptographic systems were analyzed and designed thereafter.

Shannon’s influence extends to the development of modern cryptography concepts such as Shannon’s Entropy, which is crucial in measuring information and uncertainty. This paper is frequently cited in subsequent research on both practical and theoretical cryptography developments, such as in the study by Bellare, Mihir, and Phillip Rogaway on “Modern Cryptography: A Tutorial,” and is foundationally referenced in books like “Applied Cryptography” by Bruce Schneier.

For example, the paper “Privacy Amplification by Public Discussion”, by Bennett, Brassard, et al., directly builds upon Shannon’s principles. More broadly, Shannon’s theories have found applications in designing both symmetric and asymmetric cryptosystems and have heavily influenced the pedagogy of cryptography and the development of various cryptographic standards.