Summary: |
The idea behind a cryptosystem (cipher system) is to conceal information from all that are not entitled to access it. This is done by replacing the information by what appears to be a sequence of random symbols. The essential determinant of the right of access to the information is ownership of a key needed to unlock the information from its ‘corrupted’ form.
An alternative approach to secret communication is to hide the message itself. This area is called steganography. A sophisticated approach to concealment is to both encipher a message and then conceal it.
In this lecture we introduce the two principle tools used in cryptography: substitution and transposition. |
Creators: |
|
Divisions: |
Academic > School of Computing, Engineering and Built Environment > Department of Computing > Computing |
Copyright holder: |
Copyright © Glasgow Caledonian University |
Viewing permissions: |
World |
Depositing User: |
|
Date Deposited: |
05 Apr 2019 13:32 |
Last Modified: |
13 Feb 2020 09:57 |
URI: |
https://edshare.gcu.ac.uk/id/eprint/4809 |