Entropy: An Essential Component of Cryptographic Security
Digital computers are deterministic, that is, for every input n, they will produce output x. Cryptographic systems use complex math to encrypt data using non-deterministically generated random keys, or pseudorandom keys, which are statistically indistinguishable from a random sample. Protecting data and ensuring integrity are core principals of information security. How essential is the use of secure cryptographic ciphers and truly random keys to modern cryptographic security?
Copyright (c) 2019 Jeffrey S. Schulman
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
All content on this site is copyright by Americas Institute for Cybersecurity Leadership (AICL). Authors retain ownership of submitted content, but AICL may redistribute or create derivative works with expressed consent from the author as part of the submission criteria.