Files cryptography based on one-time pad algorithm
نویسندگان
چکیده
منابع مشابه
Trichocyanines: a Red-Hair-Inspired Modular Platform for Dye-Based One-Time-Pad Molecular Cryptography
Current molecular cryptography (MoCryp) systems are almost exclusively based on DNA chemistry and reports of cryptography technologies based on other less complex chemical systems are lacking. We describe herein, as proof of concept, the prototype of the first asymmetric MoCryp system, based on an 8-compound set of a novel bioinspired class of cyanine-type dyes called trichocyanines. These nove...
متن کامل1 One - Time Pad
Secure communication is the act of conveying information from a sender to a receiver, while simultaneously hiding it from everyone else. Secure communication is the oldest application of cryptography, and remains the centerpiece of cryptography to this day. After all, the word cryptography means “hidden writing” in Greek. So, secure communication is a natural place to start our study of cryptog...
متن کاملOne Time Pad Cipher
This paper provides standard instructions on how to protect short text messages with one-time pad encryption. The encryption is performed with nothing more than a pencil and paper, but provides absolute message security. If properly applied, it is mathematically impossible for any eavesdropper to decrypt or break the message without the proper key.
متن کاملIs One-time Pad History
Are one-time pads a thing of the past? There has been quite a bit discussion and some security and cryptography experts argue that one-time pad is no longer a system for today's needs, that it is impractical and creates enormous key distribution problems. They say that current computer algorithms provide enough security and public key schemes solve the problem of key distribution. That's all tr...
متن کاملConditional quantum one-time pad
Suppose that Alice and Bob are located in distant laboratories, which are connected by an ideal quantum channel. Suppose further that they share many copies of a quantum state ρABE , such that Alice possesses the A systems and Bob the BE systems. In our model, there is an identifiable part of Bob’s laboratory that is insecure: a third party named Eve has infiltrated Bob’s laboratory and gained ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)
سال: 2021
ISSN: 2722-2578,2088-8708
DOI: 10.11591/ijece.v11i3.pp2335-2342