Files cryptography based on one-time pad algorithm

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trichocyanines: a Red-Hair-Inspired Modular Platform for Dye-Based One-Time-Pad Molecular Cryptography

Current molecular cryptography (MoCryp) systems are almost exclusively based on DNA chemistry and reports of cryptography technologies based on other less complex chemical systems are lacking. We describe herein, as proof of concept, the prototype of the first asymmetric MoCryp system, based on an 8-compound set of a novel bioinspired class of cyanine-type dyes called trichocyanines. These nove...

متن کامل

1 One - Time Pad

Secure communication is the act of conveying information from a sender to a receiver, while simultaneously hiding it from everyone else. Secure communication is the oldest application of cryptography, and remains the centerpiece of cryptography to this day. After all, the word cryptography means “hidden writing” in Greek. So, secure communication is a natural place to start our study of cryptog...

متن کامل

One Time Pad Cipher

This paper provides standard instructions on how to protect short text messages with one-time pad encryption. The encryption is performed with nothing more than a pencil and paper, but provides absolute message security. If properly applied, it is mathematically impossible for any eavesdropper to decrypt or break the message without the proper key.

متن کامل

Is One-time Pad History

Are one-time pads a thing of the past? There has been quite a bit discussion and some security and cryptography experts argue that one-time pad is no longer a system for today's needs, that it is impractical and creates enormous key distribution problems. They say that current computer algorithms provide enough security and public key schemes solve the problem of key distribution. That's all tr...

متن کامل

Conditional quantum one-time pad

Suppose that Alice and Bob are located in distant laboratories, which are connected by an ideal quantum channel. Suppose further that they share many copies of a quantum state ρABE , such that Alice possesses the A systems and Bob the BE systems. In our model, there is an identifiable part of Bob’s laboratory that is insecure: a third party named Eve has infiltrated Bob’s laboratory and gained ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)

سال: 2021

ISSN: 2722-2578,2088-8708

DOI: 10.11591/ijece.v11i3.pp2335-2342