scispace - formally typeset
Search or ask a question
Topic

Ciphertext

About: Ciphertext is a research topic. Over the lifetime, 11956 publications have been published within this topic receiving 194319 citations. The topic is also known as: cyphertext.


Papers
More filters
Journal ArticleDOI
TL;DR: The paper presents algorithm for automatic deciphering of the mono-alphabetical substituted ciphertext, a cipher where one-to-one mapping is used to substitute each of the characters of the plaintext by a corresponding character of the ciphertext.
Abstract: The mono-alphabetical substituted cipher is a cipher where one-to-one mapping is used to substitute each of the characters of the plaintext by a corresponding character of the ciphertext. One of the possibility, how solve the mono-alphabetical substituted text is frequency analysis of the single letters and frequency analysis of the bigrams of the ciphertext. The paper presents algorithm for automatic deciphering of the mono-alphabetical substituted ciphertext. Computer simulation model of the algorithm is realized in MS Excel Spreadsheet. The computer simulation enables deciphering of ciphertext of different languages.
01 Jan 2013
TL;DR: To be able to effectively encrypt and decrypt messages, correspondents must typically share knowledge of a secret key, which is used by the originator to encrypt the plaintext, and by the recipient to decrypt the ciphertext.
Abstract: When a cipher is used to exchange information, the undisguised information is called the plaintext, and the disguised information the ciphertext. The process of converting from plaintext to ciphertext is called encryption. Upon receiving a ciphertext, the recipient must remove the disguise, a process called decryption. To be able to effectively encrypt and decrypt messages, correspondents must typically share knowledge of a secret key, which is used in applying the cipher. More specifically, the key for a cipher is information usually known only to the originator and intended recipient of a message, which is used by the originator to encrypt the plaintext, and by the recipient to decrypt the ciphertext.
Patent
19 Nov 2019
TL;DR: A lattice-based encryption method was proposed in this article, where the ciphertext is hidden at a low position and can be combined with other technologies for use, and then the purpose of simultaneously hiding the high position and the low position is achieved; meanwhile, due to the introductionof a ciphertext compression technology, the bandwidth requirement of communication is also reduced.
Abstract: The invention discloses a lattice-based encryption method, which comprises the following steps of: 1) a private key S and a public key (B, A) are generated; 2) the sender calculates C0 = VA + pE1 andC = VB + pE2 by using the receiver public key; (3) the sender calculates a remainder of each coefficient of each component polynomial of the matrix C for d, the obtained remainder polynomial matrix isrecorded as rem (C), and W is made to be equal to rem (C) * D-1 mod p; then, C1 = C0 + M-W is obtained through calculation; 4) the sender calculates the quotient of each coefficient of each componentpolynomial of the matrix C to d, and the obtained quotient polynomial matrix is recorded as C2 = quo (C); and then ciphertext (C1, C2) is output. According to the method, the ciphertext is hidden ata low position and can be combined with other technologies for use, and then the purpose of simultaneously hiding the high position and the low position is achieved; meanwhile, due to the introductionof a ciphertext compression technology, the bandwidth requirement of communication is also reduced.
Patent
22 Mar 2019
TL;DR: In this article, a method for storing and using a key based on a computer feature code was proposed, where a plaintext key encrypted based on the computer feature codes is adopted in an encryption process, and aciphertext file is generated for storage; and a decryption process is used for decrypting the ciphertext file to obtain the plain-text key when application software is started through a proxy or a system hook technology.
Abstract: The invention relates to a method for storing and using a key based on a computer feature code. A plaintext key encrypted based on the computer feature codes is adopted in an encryption process, and aciphertext file is generated for storage; and a decryption process is used for decrypting the ciphertext file to obtain the plaintext key when application software is started through a proxy or a system hook technology, and the plaintext key is set in an application software running environment for use by the application software. According to the method for storing and using the key based on thecomputer feature code provided by the invention, sensitive information can be prevented from being stolen to the maximum degree due to key leakage.
Patent
19 Apr 2019
TL;DR: In this paper, the authors present a database management method, a medium and electronic equipment, and the method comprises the steps: determining key data corresponding to a database access party and used for accessing a ciphertext database according to an access request if the access request sent by the database access parties is received; Encrypting the access requests according to the key data to obtain encrypted request data; Responding to the encrypted request requests through the ciphertext databases to obtain a response result corresponding to the encryption request data. And converting the response result into plaintext data, and returning the plaintext
Abstract: The embodiment of the invention provides a database management method, a medium and electronic equipment, and the method comprises the steps: determining key data corresponding to a database access party and used for accessing a ciphertext database according to an access request if the access request sent by the database access party is received; Encrypting the access request according to the keydata to obtain encrypted request data; Responding to the encrypted request data through the ciphertext database to obtain a response result corresponding to the encrypted request data; And convertingthe response result into plaintext data, and returning the plaintext data to the database access party. According to the technical scheme provided by the embodiment of the invention, the safe storageof the data can be ensured, and meanwhile, the problem of relatively low performance caused by frequent encryption and decryption of a ciphertext database in related technologies is avoided.

Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
95% related
Encryption
98.3K papers, 1.4M citations
94% related
Authentication
74.7K papers, 867.1K citations
89% related
Key (cryptography)
60.1K papers, 659.3K citations
88% related
Server
79.5K papers, 1.4M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
2023317
2022676
2021636
20201,068
20191,496