⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 004-006.html

📁 这个是密码学的经典著作
💻 HTML
字号:
<html><head><TITLE>Learn Encryption Techniques with BASIC and C++:Technology and Terminology</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Learn Encryption Techniques with BASIC and C++</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: Wordware Publishing, Inc.)</I>
<BR>
Author(s): Gil Held
<BR>
ISBN: 1556225989
<BR>
Publication Date: 10/01/98
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=1556225989//-->
<!--TITLE=Learn Encryption Techniques with BASIC and C++//-->
<!--AUTHOR=Gilbert Held//-->
<!--PUBLISHER=Wordware Publishing, Inc.//-->
<!--CHAPTER=1//-->
<!--PAGES=004-006//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="001-004.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="006-009.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading3"></A><FONT COLOR="#000077">Cipher Terminology</FONT></H3>
<P>As previously described, a cipher system is a system in which a substitution process occurs on individual characters or groups of characters without regard to their meaning. The actual enciphering process can be performed by hardware, software, or manually by the brainpower of one or more persons.
</P>
<H4 ALIGN="LEFT"><A NAME="Heading4"></A><FONT COLOR="#000077">Plaintext and Enciphered Text</FONT></H4>
<P>The use of a cipher system requires a message or text to operate upon. The original, unaltered contents of the message or text is known as plaintext or cleartext. Through the use of a cipher system, the meaning of the plaintext message is hidden. The process of hiding the meaning of the plaintext is known as enciphering, while the resultant text is referred to as enciphered text.
</P>
<H4 ALIGN="LEFT"><A NAME="Heading5"></A><FONT COLOR="#000077">Encipherment</FONT></H4>
<P>Figure 1.1 illustrates the encipherment process in a block diagram format. In examining Figure 1.1, note that plaintext (<I>x</I>) is converted to ciphertext (<I>y</I>) by an enciphering process (<I>E</I>), such that <I>y</I>=<I>E<SUB>k</SUB>(x)</I>, where <I>k</I> is a key. The enciphering process can be considered as an algorithm which operates upon the plaintext based upon the value of a key (<I>k</I>). Thus, the key defines the operation of the encipherment algorithm and different keys result in different ciphertext being created from a fixed plaintext.</P>
<P><A NAME="Fig1"></A><A HREF="javascript:displayWindow('images/01-01.jpg',483,209 )"><IMG SRC="images/01-01t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/01-01.jpg',483,209)"><FONT COLOR="#000077"><B>Figure 1.1</B></FONT></A>&nbsp;&nbsp;The encipherment process results in the creation of ciphertext (y) by applying an encipherment algorithm (E) controlled by a key (k) against plaintext (x) so that y=E<SUB>k</SUB>(x)
</P>
<P>An example of the use of a modern key can be obtained by constructing a modulo 2 encipherment process. As a bit of review for readers who may not remember modulo arithmetic, when adding numbers using that arithmetic for base <I>n</I> you divide <I>n</I> into the added numbers and retain the remainder as the result of the modulo arithmetic process. That is, for our familiar base 10 the addition of 6 and 8 under modulo 10 results in a value of 4. Table 1.1 illustrates the results of modulo 2 for the four possibilities that can occur per bit position.</P>
<TABLE WIDTH="50%"><CAPTION ALIGN=LEFT><B>Table 1.1</B> Modulo 2 Addition
<TR>
<TH COLSPAN="4"><HR>
<TR>
<TD WIDTH="25%">0
<TD WIDTH="25%">0
<TD WIDTH="25%">1
<TD WIDTH="25%">1
<TR>
<TD><U>0</U>
<TD><U>1</U>
<TD><U>0</U>
<TD><U>1</U>
<TR>
<TD>0
<TD>1
<TD>1
<TD>0
<TR>
<TD COLSPAN="4"><HR>
</TABLE>
<P>To illustrate the encipherment process using modulo 2 addition, let&#146;s encipher the word HELP, assuming it was first stored using the 7-bit American Standard Code for Information Interchange. Let&#146;s then assume the key was the word BURP. Table 1.2 illustrates the encipherment process using modulo 2 addition.
</P>
<TABLE WIDTH="100%"><CAPTION ALIGN=LEFT><B>Table 1.2</B> Enciphering the word HELP with the key BURP using modulo 2 addition.
<TR>
<TH COLSPAN="5"><HR>
<TR>
<TD WIDTH="25%">Plaintext
<TD WIDTH="20%" ALIGN="CENTER">H
<TD WIDTH="20%" ALIGN="CENTER">E
<TD WIDTH="20%" ALIGN="CENTER">L
<TD WIDTH="15%" ALIGN="CENTER">P
<TR>
<TD>
<TD ALIGN="CENTER">1001000
<TD ALIGN="CENTER">1000101
<TD ALIGN="CENTER">1001100
<TD ALIGN="CENTER">1010000
<TR>
<TD>&#8853;Key
<TD ALIGN="CENTER">B
<TD ALIGN="CENTER">U
<TD ALIGN="CENTER">R
<TD ALIGN="CENTER">P
<TR>
<TD>
<TD ALIGN="CENTER"><U>1000010</U>
<TD ALIGN="CENTER"><U>1010101</U>
<TD ALIGN="CENTER"><U>1010010</U>
<TD ALIGN="CENTER"><U>1010000</U>
<TR>
<TD>Enciphered text
<TD ALIGN="CENTER">0001010
<TD ALIGN="CENTER">0010000
<TD ALIGN="CENTER">0011110
<TD ALIGN="CENTER">0000000
<TR>
<TD>
<TD ALIGN="CENTER">LF
<TD ALIGN="CENTER">DLE
<TD ALIGN="CENTER">RS
<TD ALIGN="CENTER">NUL
<TR>
<TD COLSPAN="5"><HR>
</TABLE>
<P>In examining the entries in Table 1.2, note that as a result of the modulo 2 encipherment process the plaintext HELP is converted into a sequence of 28 bits which represent four control characters&#151;Line Feed (LF), Data Link Escape (DLE), Record Separator (RS), and Null (NUL). Thus, if a person intercepted the enciphered text they would observe the sequence LF, DLE, RS, NUL instead of the word HELP.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="001-004.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="006-009.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


</body></html>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -