Well established needs for secure communication


This involves rearrangement of characters on the plain text into columns


Download 42 Kb.
bet4/13
Sana02.06.2024
Hajmi42 Kb.
#1840276
1   2   3   4   5   6   7   8   9   ...   13
Bog'liq
9-crypt

This involves rearrangement of characters on the plain text into columns

  • This involves rearrangement of characters on the plain text into columns
  • The following example shows how letters are transformed
    • If the letters are not exact multiples of the transposition size there may be a few short letters in the last column which can be padded with an infrequent letter such as x or z
  • T H I S I
  • S A M E S
  • S A G E T
  • O S H O W
  • H O W A C
  • O L U M N
  • A R T R A
  • N S P O S
  • I T I O N
  • W O R K S
  • T S S O H
  • O A N I W
  • H A A S O
  • L R S T O
  • I M G H W
  • U T P I R
  • S E E O A
  • M R O O K
  • I S T W C
  • N A S N S
  • Plain Text
  • Cipher Text

The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption.

  • The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption.
  • The set of keys and the enciphering algorithm should be free from complexity.
  • The implementation of the process should be as simple as possible.
  • Errors in ciphering should not propagate and cause corruption of further information in the message.
  • The size of the enciphered text should be no larger than the text of the original message.
  • Ciphers Shannon’s Characteristics of “Good” Ciphers

It is based on sound mathematics.

  • It is based on sound mathematics.
    • Good cryptographic algorithms are are derived from solid principles.
  • It has been analyzed by competent experts and found to be sound.
  • It has stood the “test of time.”
    • Over time people continue to review both mathematical foundations of an algorithm and the way it builds upon those foundations.
    • The flaws in most algorithms are discovered soon after their release.
  • Encryption Systems Properties of Trustworthy Systems

Download 42 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   13




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling