私钥密码系统的设计

ACM-SE 28 Pub Date : 1990-04-01 DOI:10.1145/98949.99160
M. Januska
{"title":"私钥密码系统的设计","authors":"M. Januska","doi":"10.1145/98949.99160","DOIUrl":null,"url":null,"abstract":"In order to design a private key cryptosystem using a layered approach, we must first examine (he basic characteristics of a conventional cryptosystem. A very simple cryplosyslcm has plaintext, a key, ciphertext, a deciphering transformation and an enciphering transformation. Plaintext is defined to be the original text in readable form; for example, (he material you arc now reading. The key is defined as a set of symbols that is used repeatedly when performing the transformations in a deterministic way. An enciphering transformation takes the key and the plaintext, performs a specific function, and outputs the ciphertext. Ciphertext is defined to be the result of this transformation. It cannot be read in the same way as this text because it won’t make any sense. In order to do this the ciphertext must be transformed using a deciphering transformation. When this is done properly, the plaintext is recovered in its original form. Let us now construct a simple cryptosystem using these definitions. The following algorithm will be used: define key = K of 64 bits in length define plaintext = message = M of L in length define ciphertext = C define input buffer = I define output buffer = O while ( <= L) /* message not completely processed */ (get next 64 bits of M and put them in a buffer I XOR (he bits in I with the key K to get C put C in 0 put 0 back in the same position (overwrite) in M | With this simple algorithm, we can do both the encryption and the decryption. This is due to the properties of the XOR operator. The property we are taking advantage of is this: a XOR b -> x, x XOR b -> a. But how do we know that the message is ncrypted? Well, just try to read it, it’s that simple! If gibberish comes up on the screen, you know that the file is encrypted. Just run the algorithm","PeriodicalId":409883,"journal":{"name":"ACM-SE 28","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The design of a private key cryptosystem\",\"authors\":\"M. Januska\",\"doi\":\"10.1145/98949.99160\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to design a private key cryptosystem using a layered approach, we must first examine (he basic characteristics of a conventional cryptosystem. A very simple cryplosyslcm has plaintext, a key, ciphertext, a deciphering transformation and an enciphering transformation. Plaintext is defined to be the original text in readable form; for example, (he material you arc now reading. The key is defined as a set of symbols that is used repeatedly when performing the transformations in a deterministic way. An enciphering transformation takes the key and the plaintext, performs a specific function, and outputs the ciphertext. Ciphertext is defined to be the result of this transformation. It cannot be read in the same way as this text because it won’t make any sense. In order to do this the ciphertext must be transformed using a deciphering transformation. When this is done properly, the plaintext is recovered in its original form. Let us now construct a simple cryptosystem using these definitions. The following algorithm will be used: define key = K of 64 bits in length define plaintext = message = M of L in length define ciphertext = C define input buffer = I define output buffer = O while ( <= L) /* message not completely processed */ (get next 64 bits of M and put them in a buffer I XOR (he bits in I with the key K to get C put C in 0 put 0 back in the same position (overwrite) in M | With this simple algorithm, we can do both the encryption and the decryption. This is due to the properties of the XOR operator. The property we are taking advantage of is this: a XOR b -> x, x XOR b -> a. But how do we know that the message is ncrypted? Well, just try to read it, it’s that simple! If gibberish comes up on the screen, you know that the file is encrypted. Just run the algorithm\",\"PeriodicalId\":409883,\"journal\":{\"name\":\"ACM-SE 28\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1990-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM-SE 28\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/98949.99160\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM-SE 28","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/98949.99160","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

为了使用分层方法设计私钥密码系统,我们必须首先研究传统密码系统的基本特征。一个非常简单的密码系统有明文、密钥、密文、解密转换和加密转换。明文被定义为可读形式的原始文本;例如,你正在阅读的材料。键被定义为一组符号,在以确定的方式执行转换时重复使用这些符号。加密转换接受密钥和明文,执行特定的功能,并输出密文。密文被定义为这种转换的结果。它不能像这篇文章那样读,因为它没有任何意义。为了做到这一点,密文必须使用解密转换进行转换。如果这样做得当,明文将恢复为其原始形式。现在让我们使用这些定义构造一个简单的密码系统。将使用以下算法:定义key =长度为64位的K定义明文= message =长度为L的M定义密文= C定义输入缓冲区= I定义输出缓冲区= O while (x, x XOR b -> a。但是我们如何知道消息是加密的?好吧,试着读一下,就这么简单!如果屏幕上出现乱码,您就知道该文件是加密的。只要运行算法
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The design of a private key cryptosystem
In order to design a private key cryptosystem using a layered approach, we must first examine (he basic characteristics of a conventional cryptosystem. A very simple cryplosyslcm has plaintext, a key, ciphertext, a deciphering transformation and an enciphering transformation. Plaintext is defined to be the original text in readable form; for example, (he material you arc now reading. The key is defined as a set of symbols that is used repeatedly when performing the transformations in a deterministic way. An enciphering transformation takes the key and the plaintext, performs a specific function, and outputs the ciphertext. Ciphertext is defined to be the result of this transformation. It cannot be read in the same way as this text because it won’t make any sense. In order to do this the ciphertext must be transformed using a deciphering transformation. When this is done properly, the plaintext is recovered in its original form. Let us now construct a simple cryptosystem using these definitions. The following algorithm will be used: define key = K of 64 bits in length define plaintext = message = M of L in length define ciphertext = C define input buffer = I define output buffer = O while ( <= L) /* message not completely processed */ (get next 64 bits of M and put them in a buffer I XOR (he bits in I with the key K to get C put C in 0 put 0 back in the same position (overwrite) in M | With this simple algorithm, we can do both the encryption and the decryption. This is due to the properties of the XOR operator. The property we are taking advantage of is this: a XOR b -> x, x XOR b -> a. But how do we know that the message is ncrypted? Well, just try to read it, it’s that simple! If gibberish comes up on the screen, you know that the file is encrypted. Just run the algorithm
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信