Loading previews...
Summary: | The idea behind a cryptosystem (cipher system) is to conceal information from all that are not entitled to access it. This is done by replacing the information by what appears to be a sequence of random symbols. The essential determinant of the right of access to the information is ownership of a key needed to unlock the information from its ‘corrupted’ form. An alternative approach to secret communication is to hide the message itself. This area is called steganography. A sophisticated approach to concealment is to both encipher a message and then conceal it. In this lecture we introduce the two principle tools used in cryptography: substitution and transposition. |
---|---|
Creators: | |
Divisions: | Academic > School of Computing, Engineering and Built Environment > Department of Computing > Computing |
Copyright holder: | Copyright © Glasgow Caledonian University |
Viewing permissions: | World |
Depositing User: | |
Date Deposited: | 05 Apr 2019 13:32 |
Last Modified: | 13 Feb 2020 09:57 |
URI: | https://edshare.gcu.ac.uk/id/eprint/4809 |
Actions (login required)
View Item |
Toolbox
There are no actions available for this resource.