??? 02/24/06 20:53 Read: times |
#110727 - Two answers ... Responding to: ???'s previous message |
First of all, in this context, synchronization is not necessarily temporal, but, in a sense, being "on the same page."
Secondly, the encrypting/dercypting process is a precisely synchronous process, like CRC calculation, which NEVER has a conditonal branch. The basic encryption process is (clear-data)XOR(key). The decyption process is (cipher)XOR(key). It's got to be the same cipher and key, but it can be at completely different times and rates. The first bit of the key must correspond with the first bit of the message, or, at least, the same bitof the key sequence that's encountered at that point in the process at the receiving end as was encountered at the transmitting end. That's the extent to which it must be synchronized. Beyond that, the main issue is that the same key be used at both ends for a given message. XOR and un-XOR are the same thing. Hence, if you xor the key with the clear-message, the result is a cipher. If you xor that cipher with the same key sequence, you will produce the clear-message. If you use two xor's located in the at the same relative point in the sequence in both transmitter and receiver, then you can introduce a cipher-feedback element as I previously described, and the same thing will result, in that the XOR's will still reverse the encryption. However, it is a little more sensitive to initialization. Zero xor i, where i is any bit, will always yield i. One xor i will yield NOT(i). RE |
Topic | Author | Date |
HOW TO PROTECT SOFTWARE? | 01/01/70 00:00 | |
When asking questions like yours ALWAYS | 01/01/70 00:00 | |
Agree with Erik | 01/01/70 00:00 | |
Agree with Erik & Jack. | 01/01/70 00:00 | |
a simple test | 01/01/70 00:00 | |
By using a programmer which supports... | 01/01/70 00:00 | |
reading correct ? | 01/01/70 00:00 | |
Maybe all he wants is ... | 01/01/70 00:00 | |
How do you propose to do this as a condi | 01/01/70 00:00 | |
Two answers ... | 01/01/70 00:00 | |
the weekness | 01/01/70 00:00 | |
HOW TO PROTECT SOFTWARE? | 01/01/70 00:00 | |
re crypting | 01/01/70 00:00 | |
re: eric | 01/01/70 00:00 | |
where ther is a will, there is a way | 01/01/70 00:00 | |
the "simple" "encryption" | 01/01/70 00:00 | |
another example : smartcards | 01/01/70 00:00 | |
Sorry, but you are O.T. | 01/01/70 00:00 | |
what ????????????????? | 01/01/70 00:00 | |
Stop misusing this forum! | 01/01/70 00:00 | |
Where are you Jog Milind?![]() | 01/01/70 00:00 |