Aiden A. Bruen - Cryptography, Information Theory, and Error-Correction

Здесь есть возможность читать онлайн «Aiden A. Bruen - Cryptography, Information Theory, and Error-Correction» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Cryptography, Information Theory, and Error-Correction: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Cryptography, Information Theory, and Error-Correction»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Cryptography, Information Theory, and Error-Correction: A Handbook for the 21ST Century
Cryptography, Information Theory, and Error-Correction

Cryptography, Information Theory, and Error-Correction — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Cryptography, Information Theory, and Error-Correction», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

New, NoteworthyWe discuss the Vigenère cipher and show how it can be broken by finding the length of the keyword and then the keyword itself. We explain clearly the simple principles involved without getting bogged down in lengthy formulae. We also give a detailed but accessible description of the famous Enigma system used in World War II both from the mechanical and the mathematical point of view.

2.1 Introduction

Since the early stages of human civilization, there has been a need to protect sensitive information from falling into the wrong hands. To achieve such secrecy, mankind has relied on a branch of mathematics known as cryptography, which is the study of designing methods to securely transmit information over nonsecure channels. In order to achieve this goal, one must first encipher, or scramble, the intended message to prevent an eavesdropper from obtaining any useful information, should the message be intercepted. The message (referred to as plain text) is scrambled into cipher textusing a predetermined key, known to both the sender and receiver. The encrypted message is constructed in such a way so as to be resilient against attack, while allowing the intended recipient to decipher, or unscramble the message with ease. The methods we will be investigating in this section to accomplish this task may be outdated and in some cases obsolete, but they can still provide us with valuable insight into some techniques that are still in use today.

2.2 The Caesar Cipher

While Julius Caesar was building his empire, he needed a method to transmit vital messages without risk of the enemy obtaining any crucial information. To achieve this goal, he employed one of the first known ciphering methods. The idea was to substitute each letter of the plain text with the letter appearing three spaces to the right in the alphabet, i.e. a is enciphered to D, b is enciphered to E, and z is enciphered to C (the alphabet wraps around). Thus, “six” is enciphered to “VLA.”

In practice, this can be easily achieved using a simple device consisting of two disks, such as the one shown in Figure 2.1. Both disks have the alphabet engraved on their perimeter, and they can rotate with respect to each other. If we assign the inner disk to represent the plain text alphabet and the outer disk to represent the cipher text alphabet, enciphering is accomplished simply by rotating the outer disk by three letters counter clockwise and reading off the cipher text corresponding to the plain text. To decipher the message, one must only reverse the procedure. The “key” of the cipher is just the number of letters that the outer disk is shifted by, and is denoted by k. Both sender and recipient are in possession of this common secret key.

For a numerical explanation, suppose we label Cryptography Information Theory and ErrorCorrection - изображение 32by the numbers Cryptography Information Theory and ErrorCorrection - изображение 33. Using Caesar's key of three, the plain text message “six” is enciphered as follows:

Cryptography Information Theory and ErrorCorrection - изображение 34 Cryptography Information Theory and ErrorCorrection - изображение 35

Figure 2.1Caesar cipher wheel.

Note that in the above example, Cryptography Information Theory and ErrorCorrection - изображение 36. We replace 26 by Cryptography Information Theory and ErrorCorrection - изображение 37which is the remainder when we divide by 26 (see Chapter 19for details). In this case, the remainder is 0, corresponding to the letter A. Similarly, Cryptography Information Theory and ErrorCorrection - изображение 38becomes Cryptography Information Theory and ErrorCorrection - изображение 39. The number 9 corresponds to the letter J.

To decipher the message, reverse the operation (shift left by Cryptography Information Theory and ErrorCorrection - изображение 40spaces):

Cryptography Information Theory and ErrorCorrection - изображение 41

In this case, we have Cryptography Information Theory and ErrorCorrection - изображение 42. If картинка 43is a negative number, then it is replaced by Cryptography Information Theory and ErrorCorrection - изображение 44. So, for example Cryptography Information Theory and ErrorCorrection - изображение 45gets replaced by Cryptography Information Theory and ErrorCorrection - изображение 46. The reasoning is that Cryptography Information Theory and ErrorCorrection - изображение 47since Cryptography Information Theory and ErrorCorrection - изображение 48. Alternatively, (see Chapter 19) we have Cryptography Information Theory and ErrorCorrection - изображение 49.

The Caesar cipher is a simple example of a type of cipher known as a monoalphabeticcipher. Monoalphabetic ciphers belong to a class of ciphers known as substitution ciphers, in which all of the plain text characters in the message are substituted for another letter. Mathematically speaking, the enciphering process of a monoalphabetic cipher can be represented by the mapping of a plain text character to a cipher text character:

Similarly deciphering is represented by the mapping where is - фото 50

Similarly, deciphering is represented by the mapping

Cryptography Information Theory and ErrorCorrection - изображение 51

where Cryptography Information Theory and ErrorCorrection - изображение 52is the cipher key, with Cryptography Information Theory and ErrorCorrection - изображение 53. In the case of the Caesar cipher, If is negative then as explained above To break such a cipher o - фото 54. If is negative then as explained above To break such a cipher one can - фото 55is negative, then, as explained above, To break such a cipher one can decrypt the message by trying all 26 keys - фото 56.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Cryptography, Information Theory, and Error-Correction»

Представляем Вашему вниманию похожие книги на «Cryptography, Information Theory, and Error-Correction» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Cryptography, Information Theory, and Error-Correction»

Обсуждение, отзывы о книге «Cryptography, Information Theory, and Error-Correction» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x