Military communications, we must consider want to send secret information transmitted on the way in addition to a third party other than the sender and the recipient (in particular the possibility intercepted by the enemy) to carry information carrier (such as text, the radio was, etc. make intercept) even in the case of intercepted know which the information content of the communication methods or techniques, known as the secure communication. Cryptography is a secure communication, it is mean to express information in clear text symbol communicating parties in advance of the agreed transformation rules, is transformed into another string of inexplicable symbols, as the text of the communication sent to the recipient, When the hands of this text sent to the recipient, the recipient - does not recognize the meaning of which represents, then we should, according to the prior agreement of the transformation rules,fake oakley sunglasses, it restored the original meaning is clear text, and then read. In this way, if this text is in the communication on the way third party intercepted by a third party - like do not know that the transformation rules, so he was unable to ascertain the information hidden behind the symbols in this string of Of course, the purpose of the war, he would do everything possible to efforts to get this transformation rules. An effort has been intercepted ciphertext, sometimes combined with the relevant information from other sources to try to find the transformation rules.
In cryptography, we want to send a common language to articulate the text referred to as plaintext, expressly formed by the transformation of a string of symbols for cryptography is called ciphertext plaintext transformation rules according to the agreed The transformation process of the ciphertext is called encryption, the recipient with the transformation rules of the convention the ciphertext back to plaintext process called decryption. The enemy around the intercepted ciphertext sub-
No comments:
Post a Comment