Cryptography Reference
In-Depth Information
0
1
Figure 1.2. Pixel coding for visual cryptography.
whose XOR is 0. Hence we can visually decrypt. As an example, Fig. 1.4 shows a
ciphertext, a key, and what we see from the overlay.
1.1.5 Enigma: Toward Industrial Cryptography
A famous example of an industrial encryption scheme is the Enigma machine which
was used by the Germans during World War II.
We let
π
be a fixed permutation over the 26-character alphabet with the following
properties:
it has no fixed point (
π
( x )
=
x for any x ),
it is an involution (
π
(
π
( x ))
=
x for any x ).
We let S be a set of five permutations over the alphabet. For
α
S ,welet
α i denote
ρ i
i
i
α ρ
where
ρ
is the circular rotation over the alphabet by one position (
ρ
thus denotes the circular rotation over the alphabet by i positions). We let
be any
involution over the alphabet with the property that it has exactly six fixed points. We
pick
σ
α, β, γ
S pairwise different. We pick a number a .
0 0
−→
0 1
−→
=
−→
=
1 0
−→
1 1
Figure 1.3. Visual pixel XOR.
 
Search WWH ::




Custom Search