Outline•Conventional Encryption Principles•Conventional Encryption Algorithms•Cipher Block Modes of Operation•Location of Encryption Devices•Key Distribution2
Simple ways to protect Message ConfidentialityExample 2.1Yhbh b1 d dd hi h f h You choose a secret number, say the number 1, and add this to each of the digit in the string “123456”:123456+111111↓234567Figure 2.1A Simple AlgorithmThus you will store the number “234567” instead. To recover the original number string, you just need to subtract the number “1” from each digit of the stored number.Others: (i) Use of translation and reverse translation tables (transformations)(ii) Permutations3
has intentionally blurred sections.
Sign up to view the full version.