2014 | OriginalPaper | Buchkapitel
Human Decipherable Encryption Scheme
verfasst von : Dr. Sebastian Pape
Erschienen in: Authentication in Insecure Environments
Verlag: Springer Fachmedien Wiesbaden
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
At first, we define four sets suitable for the domains and codomains of the encoding and encryption functions defined in the next subsections. As mentioned in Sect. 2.2, messages are encrypted with a key to ciphertexts as shown in Fig. 4.1a. Without anticipating the following subsections, we point out that messages are first encoded and then encrypted with a key distinguishing between codings and encryptions (see Fig. 4.1). Therefore the following definitions introduce messages, codings, ciphertexts and keys consisting of characters from a particular alphabet which fit into the notion one may intuitively expect.