{"title":"计算机间信息传输的增强加密技术","authors":"Omar Kassem Khalil, A. Boudjella","doi":"10.1109/DeSE.2013.50","DOIUrl":null,"url":null,"abstract":"In this work, a symmetric key cryptographic technique for encrypting/decrypting data is implemented with C language. The proposed technique is mainly intended for sending an email, a private instant messaging or text blocks. The plaintext for encryption/decryption is treated at the bit level which provides more security than mingling and mangling characters. In addition, the advantage of this technique is that both, the key algorithm which is generated from the plaintext stream bit and the encryption/decryption algorithm are the same. If we change a key from one encryption to another using the same plaintext, the ciphertext will be different. Errors in one or more bits of the ciphertext do not affect the future ciphertext blocks. The disadvantage is the security problem. Equal blocks in the plaintext become equal blocks in the ciphertext, which is easy to guess from the ciphertext that two blocks are the same.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"187 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Enhanced Cryptographic Technique for Messages Traveling between Computers\",\"authors\":\"Omar Kassem Khalil, A. Boudjella\",\"doi\":\"10.1109/DeSE.2013.50\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work, a symmetric key cryptographic technique for encrypting/decrypting data is implemented with C language. The proposed technique is mainly intended for sending an email, a private instant messaging or text blocks. The plaintext for encryption/decryption is treated at the bit level which provides more security than mingling and mangling characters. In addition, the advantage of this technique is that both, the key algorithm which is generated from the plaintext stream bit and the encryption/decryption algorithm are the same. If we change a key from one encryption to another using the same plaintext, the ciphertext will be different. Errors in one or more bits of the ciphertext do not affect the future ciphertext blocks. The disadvantage is the security problem. Equal blocks in the plaintext become equal blocks in the ciphertext, which is easy to guess from the ciphertext that two blocks are the same.\",\"PeriodicalId\":248716,\"journal\":{\"name\":\"2013 Sixth International Conference on Developments in eSystems Engineering\",\"volume\":\"187 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Sixth International Conference on Developments in eSystems Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DeSE.2013.50\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Sixth International Conference on Developments in eSystems Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DeSE.2013.50","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Enhanced Cryptographic Technique for Messages Traveling between Computers
In this work, a symmetric key cryptographic technique for encrypting/decrypting data is implemented with C language. The proposed technique is mainly intended for sending an email, a private instant messaging or text blocks. The plaintext for encryption/decryption is treated at the bit level which provides more security than mingling and mangling characters. In addition, the advantage of this technique is that both, the key algorithm which is generated from the plaintext stream bit and the encryption/decryption algorithm are the same. If we change a key from one encryption to another using the same plaintext, the ciphertext will be different. Errors in one or more bits of the ciphertext do not affect the future ciphertext blocks. The disadvantage is the security problem. Equal blocks in the plaintext become equal blocks in the ciphertext, which is easy to guess from the ciphertext that two blocks are the same.