Modeling criptosystem with operated operations of enciphering by means of the program multisim

Автор: Alekseev A.P., Zherenov Y.V., Orlov V.V.

Журнал: Инфокоммуникационные технологии @ikt-psuti

Рубрика: Технологии компьютерных систем и сетей

Статья в выпуске: 4 т.7, 2009 года.

Бесплатный доступ

In the suggested cipher each symbol (the letter, a punctuation mark, number) is replaced with two real numbers. These two numbers are top and bottom limits of the determined integral. Value of integral is used that under the table of replacements to define, to what symbol of a open text there corresponds the calculated value of integral. It is supposed, that the kind of subintegral function and a configuration of the table of replacements are known only to authorized representatives on the transmitting and reception sides. In each session of communication the table of replacements and subintegral function are defined by a confidential key.

Еще

Короткий адрес: https://sciup.org/140191359

IDR: 140191359

Статья научная