MATHEMATICAL METHDS OF FORMATIONMULTIALPHABETIC CODES OF REPLACEMENT


Cite item

Full Text

Abstract

In the suggested cipher each symbol (the letter, a punctuation mark, number) is replaced with two real numbers. These two numbers are top and bottom limits of the determined integral. Value of integral is used that under the table of replacements to define, to what symbol of a open text there corresponds the calculated value of integral. It is supposed, that the kind of sub-integral function and a configuration of the table of replacements are known only to authorized representatives on the transmitting and reception sides. In each session of communication the table of replacements and sub-integral function are defined by a confidential key.

About the authors

A P Alekseev

A P Alekseev

References

  1. Алексеев А.П. Информатика 2007. М.: СО- ЛОН-ПРЕСС, 2007. - 608 с.
  2. Бабаш А.В., Шанкин Г.П. Криптография. М.: СОЛОН-Р, 2002. - 512 с.

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2009 Alekseev A.P., Alekseev A.P.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies