Prev: On selection of polynomials for the Multiple Polynomial Quadratic Sieve
Next: Very basic questions
From: WTShaw on 26 Mar 2010 16:51 Counted Hashing as an historic tool, and beyond...into ignotum per ignotius. ACA's Nicodemus and Tridigital ciphers both use a counting method to turn a word or words into a string of numbers. It is easy enough to see that given enough source letters, 26, the whole alphabet could be assigned to the ranking, repeated characters from left to right simply given the next number available. The results are one way of making strings into permutations. Chaining several permutations requires a tad more doing, the result being several difficult or impossible to reverse sequential permutations. If a key even for the parodoxical OTP was treated this way, grossly a Random string would be produced for actual use in encryption purposes since ever 26 characters it, the key, would contain all the possibilities.
|
Pages: 1 Prev: On selection of polynomials for the Multiple Polynomial Quadratic Sieve Next: Very basic questions |