> Traditionally, information-theoretic analyses of secure schemes have assumed that the source files are perfectly uniform. In practice, they rarely are, but they’re close enough that it appeared that the standard mathematical analyses still held.
After reading your comment, I'm confused. Are they talking about the entropy of the key or of the plaintext?
> Traditionally, information-theoretic analyses of secure schemes have assumed that the source files are perfectly uniform. In practice, they rarely are, but they’re close enough that it appeared that the standard mathematical analyses still held.
After reading your comment, I'm confused. Are they talking about the entropy of the key or of the plaintext?