Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Information Security: Principles and Practice
Information Security: Principles and Practice
A simple encryption strategy based on addition
Journal of Computing Sciences in Colleges
Hi-index | 0.00 |
After briefly describing the basic strategy within the Additive Cryptosystem (AC), this paper highlights three techniques that could make the ciphertext more difficult to decode by any unauthorized entity when the symmetric key is unknown. One or more of these techniques can be incorporated into the AC to make it more secure; this allows each instructor several different options regarding which security features will be implemented if an interesting (and challenging) programming assignment - one that utilizes low level, bit-wise operations, and some elementary file I/O - is desired.