{"title":"KETA:公钥对称密码系统","authors":"B. Kabulov, N. Tashpulatova","doi":"10.1109/ICAICT.2010.5612069","DOIUrl":null,"url":null,"abstract":"The new method of encrypting has been developed. The difference from existing methods is that the identifier of one of the agreed plaintexts (resource files) and the number of the combinatorial permutation of symbols of the indicated resource file is being transmitted, but not the ciphertext. In this connection the developed cryptosystem was named KETA (Key Exist, cipherText Absent). The main idea of the method is based on that any text (plaintext) can be created in the result of permutations of symbols (and also by using some special methods) from any other given text.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"KETA: Public-key symmetric cryptosystem\",\"authors\":\"B. Kabulov, N. Tashpulatova\",\"doi\":\"10.1109/ICAICT.2010.5612069\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The new method of encrypting has been developed. The difference from existing methods is that the identifier of one of the agreed plaintexts (resource files) and the number of the combinatorial permutation of symbols of the indicated resource file is being transmitted, but not the ciphertext. In this connection the developed cryptosystem was named KETA (Key Exist, cipherText Absent). The main idea of the method is based on that any text (plaintext) can be created in the result of permutations of symbols (and also by using some special methods) from any other given text.\",\"PeriodicalId\":314036,\"journal\":{\"name\":\"2010 4th International Conference on Application of Information and Communication Technologies\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-10-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 4th International Conference on Application of Information and Communication Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAICT.2010.5612069\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 4th International Conference on Application of Information and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2010.5612069","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The new method of encrypting has been developed. The difference from existing methods is that the identifier of one of the agreed plaintexts (resource files) and the number of the combinatorial permutation of symbols of the indicated resource file is being transmitted, but not the ciphertext. In this connection the developed cryptosystem was named KETA (Key Exist, cipherText Absent). The main idea of the method is based on that any text (plaintext) can be created in the result of permutations of symbols (and also by using some special methods) from any other given text.