The Internet Archive has a preservation copy of this work in our general collections.
The file type is
Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on computability logic to quantify Shannon's work function and evaluate resource use in cryptanalysis. A simple cost function is defined which allows to quantify a wide range of theoretical and realarXiv:1003.2123v1 fatcat:7k7yyt7f3zb4ff5r55dtbclade