Hybrid Strategies for Choosing Suitable Cryptosystem Based on Game and Information Theories

This paper provides a new approach for enhancing the security of a computer. This enhancement can be achieved by treatment with the best strategy for executing some chosen crypto-systems on a computer. The enhancement process is done in two stages; the first stage depends on the result of the security evaluation of the crypto-system. The second stage compares several crypto-systems which are evaluated in the first stage. This research is a complementary to the previous published papers and focused on comparing different crypto-systems which are strongly different in their securities, and propose the best strategies for their use. The proposed approach used information theory and triangular game as a basic rule in order to provide accurate indicators for the security of crypto-systems, and also used diagonal game to suggest the best strategy to use the cryptosystems.

[1]  Sattar B. Sadkhan,et al.  A proposed ANFIS evaluator for RSA cryptosystem used in cloud networking , 2017, 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT).

[2]  Sattar B. Sadkhan,et al.  Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory , 2018, 2018 International Conference on Engineering Technology and their Applications (IICETA).

[3]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[6]  Dario Bauso Chapter 2: Two-Person Zero-Sum Games , 2016 .

[7]  W. Lucas Game Theory and Its Applications , 1982 .

[8]  Magnus Ramage Evaluation of learning, evaluation as learning , 1996, SIGO.

[9]  Hari Wahyudi,et al.  Evaluation of Learning , 2014 .

[10]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[11]  Dhilal M. Reda,et al.  Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory , 2018, 2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT).

[12]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[13]  Dominic Bucerzan,et al.  Stream Ciphers Analysis Methods , 2010, Int. J. Comput. Commun. Control.

[14]  Sattar B. Sadkhan,et al.  Block cipher security evaluation based on fuzzy logic , 2013, 2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE).

[15]  Christos Douligeris,et al.  Network Security: Current Status and Future Directions , 2007 .

[16]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks , 2008 .

[17]  Sattar B. Sadkhan,et al.  A Proposed Security Evaluator for Cryptosystem Based on Information Theory and Triangular Game , 2018, 2018 International Conference on Advanced Science and Engineering (ICOASE).