Sei sulla pagina 1di 1

\chapter{Mathematical Model }

\section{Input:}
\textbf{Alphabets and Texts-}
Let S be a finite set, and call it alphabet. Call its elements letters (or symbols,
or characters).\\
Examples. Here are some alphabets of cryptographic relevance:\\
\begin{itemize}
\item {A, B, . . . , Z}, the standard 26 letter alphabet of classical
cryptography.\\
\item The 95 character alphabet of printable ASCII characters from �blank� to
�tilde�, including punctuation marks, numbers, lowercase, and uppercase letters.\\
\item {0, 1} = F2, the alphabet of bits, or the field of two elements. The earliest
appearence (after Bauer[1]) is Bacon 1605.\\
\item F52, the alphabet used for telegraphy code since Baudot (1874). It has 32
different symbols and also goes back to Bacon (after Bauer[1]).\\
\item F82, the alphabet of bytes (correctly: octets, because in early computers
bytes did not necessarily consist of exactly 8 bits). The earliest appearance seems
to be at IBM around 1964.\\
\item More generally Fl2, the alphabet of l-bit blocks. Often l = 64 (for example
in DES or IDEA), or l = 128 (for example in AES).\\
\end{itemize}
\section{Output:}
\textbf{Cipher Text-}
Let K be a set (finite or infinite), and call its elements keys.\\
\textbf{Definition}\\
(i) An encryption function over S is an injective map
f.
(ii) A cipher (also called encryption system or cryptosystem) over S
with key space K is a family F = (fk)k$?$K of encryption functions over input.\\
(iii) Let F be a cipher over S, and F� = {fk|k $?$ K} $?$ Map($S* S*$) be
the corresponding set of different encryption functions. Then log2(K)
is called the key length, and d(F) = log2(F), the effective key
length of the cipher F.

Top Resources:
1. Coursera
2. Udacity
3. My Website: CleverProgrammer.com (For Python it might be the best resource)
4. Edx
5. Team Tree House
6. Udemy (Build Projects)
7. Free Code Camp (Web Development)
8. Solo Learn (Phone App)
9. Codecademy

Potrebbero piacerti anche