gogoRat gogoRat 3 novembre 2016 20:11

@pemile
toutefois :
« This set-up, although rudimentary, suffices for basic schemes, in particular allowing for the possibility that Alice and Bob decide to rely on K as a one-time pad, performing encryption and decryption simply by XORing the key K with the plaintext P and the ciphertext C, respectively. However, we do not require that Alice and Bob function in this way—and indeed, in our experiments in Section 2.5, they discover other schemes.
 For simplicity, we ignore the process of generating a keyfrom a seed. We also omit the use of randomness for probabilistic encryption »

>> encore du pain sur la planche devant une stratégie ’humaine’ de cryptage des plus basiques !


Ajouter une réaction

Pour réagir, identifiez-vous avec votre login / mot de passe