MATHEMATICAL METHDS OF FORMATIONMULTIALPHABETIC CODES OF REPLACEMENT


如何引用文章

全文:

详细

In the suggested cipher each symbol (the letter, a punctuation mark, number) is replaced with two real numbers. These two numbers are top and bottom limits of the determined integral. Value of integral is used that under the table of replacements to define, to what symbol of a open text there corresponds the calculated value of integral. It is supposed, that the kind of sub-integral function and a configuration of the table of replacements are known only to authorized representatives on the transmitting and reception sides. In each session of communication the table of replacements and sub-integral function are defined by a confidential key.

作者简介

A Alekseev

A Alekseev

参考

  1. Алексеев А.П. Информатика 2007. М.: СО- ЛОН-ПРЕСС, 2007. - 608 с.
  2. Бабаш А.В., Шанкин Г.П. Криптография. М.: СОЛОН-Р, 2002. - 512 с.

补充文件

附件文件
动作
1. JATS XML

版权所有 © Alekseev A.P., Alekseev A.P., 2009

Creative Commons License
此作品已接受知识共享署名-非商业性使用-禁止演绎 4.0国际许可协议的许可。