{"title":"私钥密码系统的设计","authors":"M. Januska","doi":"10.1145/98949.99160","DOIUrl":null,"url":null,"abstract":"In order to design a private key cryptosystem using a layered approach, we must first examine (he basic characteristics of a conventional cryptosystem. A very simple cryplosyslcm has plaintext, a key, ciphertext, a deciphering transformation and an enciphering transformation. Plaintext is defined to be the original text in readable form; for example, (he material you arc now reading. The key is defined as a set of symbols that is used repeatedly when performing the transformations in a deterministic way. An enciphering transformation takes the key and the plaintext, performs a specific function, and outputs the ciphertext. Ciphertext is defined to be the result of this transformation. It cannot be read in the same way as this text because it won’t make any sense. In order to do this the ciphertext must be transformed using a deciphering transformation. When this is done properly, the plaintext is recovered in its original form. Let us now construct a simple cryptosystem using these definitions. The following algorithm will be used: define key = K of 64 bits in length define plaintext = message = M of L in length define ciphertext = C define input buffer = I define output buffer = O while ( <= L) /* message not completely processed */ (get next 64 bits of M and put them in a buffer I XOR (he bits in I with the key K to get C put C in 0 put 0 back in the same position (overwrite) in M | With this simple algorithm, we can do both the encryption and the decryption. This is due to the properties of the XOR operator. The property we are taking advantage of is this: a XOR b -> x, x XOR b -> a. But how do we know that the message is ncrypted? Well, just try to read it, it’s that simple! If gibberish comes up on the screen, you know that the file is encrypted. Just run the algorithm","PeriodicalId":409883,"journal":{"name":"ACM-SE 28","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The design of a private key cryptosystem\",\"authors\":\"M. Januska\",\"doi\":\"10.1145/98949.99160\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to design a private key cryptosystem using a layered approach, we must first examine (he basic characteristics of a conventional cryptosystem. A very simple cryplosyslcm has plaintext, a key, ciphertext, a deciphering transformation and an enciphering transformation. Plaintext is defined to be the original text in readable form; for example, (he material you arc now reading. The key is defined as a set of symbols that is used repeatedly when performing the transformations in a deterministic way. An enciphering transformation takes the key and the plaintext, performs a specific function, and outputs the ciphertext. Ciphertext is defined to be the result of this transformation. It cannot be read in the same way as this text because it won’t make any sense. In order to do this the ciphertext must be transformed using a deciphering transformation. When this is done properly, the plaintext is recovered in its original form. Let us now construct a simple cryptosystem using these definitions. The following algorithm will be used: define key = K of 64 bits in length define plaintext = message = M of L in length define ciphertext = C define input buffer = I define output buffer = O while ( <= L) /* message not completely processed */ (get next 64 bits of M and put them in a buffer I XOR (he bits in I with the key K to get C put C in 0 put 0 back in the same position (overwrite) in M | With this simple algorithm, we can do both the encryption and the decryption. This is due to the properties of the XOR operator. The property we are taking advantage of is this: a XOR b -> x, x XOR b -> a. But how do we know that the message is ncrypted? Well, just try to read it, it’s that simple! If gibberish comes up on the screen, you know that the file is encrypted. Just run the algorithm\",\"PeriodicalId\":409883,\"journal\":{\"name\":\"ACM-SE 28\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1990-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM-SE 28\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/98949.99160\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM-SE 28","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/98949.99160","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
为了使用分层方法设计私钥密码系统,我们必须首先研究传统密码系统的基本特征。一个非常简单的密码系统有明文、密钥、密文、解密转换和加密转换。明文被定义为可读形式的原始文本;例如,你正在阅读的材料。键被定义为一组符号,在以确定的方式执行转换时重复使用这些符号。加密转换接受密钥和明文,执行特定的功能,并输出密文。密文被定义为这种转换的结果。它不能像这篇文章那样读,因为它没有任何意义。为了做到这一点,密文必须使用解密转换进行转换。如果这样做得当,明文将恢复为其原始形式。现在让我们使用这些定义构造一个简单的密码系统。将使用以下算法:定义key =长度为64位的K定义明文= message =长度为L的M定义密文= C定义输入缓冲区= I定义输出缓冲区= O while (x, x XOR b -> a。但是我们如何知道消息是加密的?好吧,试着读一下,就这么简单!如果屏幕上出现乱码,您就知道该文件是加密的。只要运行算法
In order to design a private key cryptosystem using a layered approach, we must first examine (he basic characteristics of a conventional cryptosystem. A very simple cryplosyslcm has plaintext, a key, ciphertext, a deciphering transformation and an enciphering transformation. Plaintext is defined to be the original text in readable form; for example, (he material you arc now reading. The key is defined as a set of symbols that is used repeatedly when performing the transformations in a deterministic way. An enciphering transformation takes the key and the plaintext, performs a specific function, and outputs the ciphertext. Ciphertext is defined to be the result of this transformation. It cannot be read in the same way as this text because it won’t make any sense. In order to do this the ciphertext must be transformed using a deciphering transformation. When this is done properly, the plaintext is recovered in its original form. Let us now construct a simple cryptosystem using these definitions. The following algorithm will be used: define key = K of 64 bits in length define plaintext = message = M of L in length define ciphertext = C define input buffer = I define output buffer = O while ( <= L) /* message not completely processed */ (get next 64 bits of M and put them in a buffer I XOR (he bits in I with the key K to get C put C in 0 put 0 back in the same position (overwrite) in M | With this simple algorithm, we can do both the encryption and the decryption. This is due to the properties of the XOR operator. The property we are taking advantage of is this: a XOR b -> x, x XOR b -> a. But how do we know that the message is ncrypted? Well, just try to read it, it’s that simple! If gibberish comes up on the screen, you know that the file is encrypted. Just run the algorithm