Technology sharing

Exquisita explicatio cryptographiae principiorum 5】

2024-07-08

한어Русский языкEnglishFrançaisIndonesianSanskrit日本語DeutschPortuguêsΕλληνικάespañolItalianoSuomalainenLatina

subcinctus cipher

Overview

Accipe z 26 operationem in exemplum, k clavis encryption est: ek ( x ) = ( xk ) mod 26 decryption : dk ( x ) = ( x k ) mod 26 Accipe z_{26} operationem in exemplum, k est key Encryption: e_k(x)=(xk) mod 26 \Decryption: d_k(x)=(xk) mod 26byz*26Operatio in exemplum,knam clavisencryption:ek(x****)=(x**** k)mo**d***26Decryption:d***k(x****)=(x****k)mo**d***26
In usu utimur Z 256 Z_{256}Z256Operatio (coetus praeter operationem)

code

#include