Cryptography Reference
In-Depth Information
Figure 1.4. Visual cryptography example.
26 3 ,welet
For a plaintext x
=
x 1 ,...,
x m with m
<
y i = σ 1
α 1
i 1
β 1
i 2
γ 1
i 3
◦ π ◦ γ i 3 β i 2 α i 1 σ
( x i )
where i 3 i 2 i 1 are the last three digits of the basis 26 numeration of i
+
a . Finally, we let
y
=
y 1 ,...,
y m be the ciphertext.
This is a mathematical definition of an electromechanical device. In practice,
α
,
β
, and
γ
are rotors that permute 26 electrical signals,
α i simply consists of
α
turned
by i positions, S is a box of five rotors,
π
is a cabled permutation which sends back
electrical signals,
σ
is a configurable wire connection, and a is the initial position of
the rotors.
Here the secret consists of
the specification of manufactured permutations like
π
and the five permutations
of S ,
the choice of the initial offset a ,
the choice of
σ
.
Once again, we notice that the Enigma cipher consists of a keyed substitution. Here,
the key is rather short.
Search WWH ::




Custom Search