Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory

security evaluation of cryptosystem is a critical topic in cryptology. It is used to differentiate among cryptosystems' security. The aim of this paper is to produce a new model for security evaluation of cryptosystems, which is a combination of two theories (Game Theory and Information Theory). The result of evaluation method can help researchers to choose the appropriate cryptosystems in Wireless Communications Networks such as Cognitive Radio Networks.

[1]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks , 2008 .

[2]  Sungwook Kim,et al.  Game Theory Applications in Network Design , 2014 .

[3]  Sattar B. Sadkhan,et al.  A proposed ANFIS evaluator for RSA cryptosystem used in cloud networking , 2017, 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT).

[4]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[5]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[6]  조위덕 Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.

[7]  Sattar B. Sadkhan,et al.  Security evaluation of cryptosystems used in cloud networks , 2016, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).

[8]  Hari Wahyudi,et al.  Evaluation of Learning , 2014 .

[9]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[10]  Magnus Ramage Evaluation of learning, evaluation as learning , 1996, SIGO.

[11]  Lloyd R. Jaisingh Statistics for the Utterly Confused , 2000 .

[12]  Sean Murphy,et al.  Cryptography: A Very Short Introduction , 2002 .