Security enhancements for the additive cryptosystem

  • Authors:
  • John A. Trono

  • Affiliations:
  • Saint Michael's College, Colchester, VT

  • Venue:
  • Journal of Computing Sciences in Colleges
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

After briefly describing the basic strategy within the Additive Cryptosystem (AC), this paper highlights three techniques that could make the ciphertext more difficult to decode by any unauthorized entity when the symmetric key is unknown. One or more of these techniques can be incorporated into the AC to make it more secure; this allows each instructor several different options regarding which security features will be implemented if an interesting (and challenging) programming assignment - one that utilizes low level, bit-wise operations, and some elementary file I/O - is desired.