The secret key of user is represented by an attribute set and cipher text
is associated with defined access structure by data owner.
Instead of directly encrypting the value of a coefficient, the address of the coefficient is encrypted to get the address of cipher text
Symmetric encryption was used to produce a cipher text
C from a seed S.
If a same block is repeated again in the plaintext, in electronic code book (ECB) mode, we get the same cipher text
for the repeated blocks.
Plain text = CF 57 47 10 27 73 65 1A 6E 23 88 18 A2 7C B9 EF Secret Key = 88 5C 36 49 B8 40 D9 E0 06 D0 61 F5 F6 FC 60 46 Cipher Text
= 38 B1 4D 2A 56 81 2F 13 FF EE 38 69 FA A4 77 40 TABLE 5.
Therefore, according to the analysis of correlation coefficient, we can draw the conclusion that the effect of image encryption is much better, because the statistical characteristics between pixels of the plaintext image have ceased to exist in the cipher text
Construct the Playfair matrix using the secret key [SK] and then apply traditional Playfair encryption process to get Amino acid of cipher text
One-time pad encryption removes bit dependencies in cipher texts
if the key used has its bits independent.
This hidden information can be plain text, cipher text
(unintelligible) or images.
With traditional encryption, when a database or application needs to store sensitive data such as credit card or national insurance numbers, those values are encrypted and then the cipher text
is returned to the original location.
To encrypt plaintext, P, with a key, producing cipher text
, C, simply compute the bitwise exclusive-or of the key and the plaintext:
Finally, Bill receives the message sent by Alice, and decrypts the message by testing the biometric keys in his database against the received cipher text