石头:2229 - 371 x
多路反馈修改加密标准VER-2 (MWFES-2)
纳等人开发了一种多路反馈方法加密标准我最近[18],在作者使用向前和向后的反馈从左到右和从右到左的纯文本的关键。MWFES-I,纯文本的ASCII值添加与关键和转发反馈(FF)和逆向反馈(BF)获得中级密文。最初的FF和男朋友是0。中间密文是256年模操作得到密文。这个密文反馈下一列。在第二轮我们计算的皇家的密文。MWFES-II,作者使用了一个更通用的方法。FF和高炉应用使用跳过n列;在„na€ÿ可以0到任意数量小于纯文本的长度。在目前的方法(多路反馈修改加密标准,版本2),作者介绍了两种不同的跳过„n1a€ÿ和„n2a€ÿ。 We perform „n1‟ skips for forward feedback (that is, from the left), and „n2‟ skip for backward feedback (that is, from the right). „n1‟ and „n2‟ may or may not be equal and is taken as a function of the generated keypad. The authors applied the present method on some standard plain texts such as 1024 ASCII „0‟, 1024 ASCII „1‟, 1024 ASCII „2‟ and 1024 ASCII „3‟ and the frequency analysis shows the encrypted texts are totally random. Initially, the user has to enter a secret key (seed). The key-expansion algorithm generates an enlarged keypad of the size of the plain-text from the seed. This keypad is used for further encryption and decryption. The present method is very effective as the encrypted text changes drastically on varying the skip „n1‟ and „n2‟. Modified MWFES-2 can be applied to encrypt any short message, password, confidential message or any other important document. The results show that the present method is free from standard attacks such as differential attack, known plain text attack etc.
Saptarshi Chatterjee Debdeep苏,Ankita Bose, Surajit Bhowmik Asoke纳