- 1,028
- 762
Alice generates a random series of digits that define a key 0 < K < 1, using a physics based, nearly perfect random generator. She then calculates exp( Pi * K) / 4, or some such irrational number. She calculates as many decimal places as are required to encrypt the block of plain text. She converts the result to hexadecimal. She takes successive pairs of digits of this hex value and XORs them bytewise with the plain text characters. Finally, Alice inserts the hex digits of K among these encryped text characters using a protocol known only to her and Bob.
Bob recovers the digits of K from the received string using the known protocol, and re-generates the key K and the secret number exp(Pi * K ) / 4. Then he XORs this with the plain text (remaining after removing the key digits) and recovers the original plain text.
Eve has no information at all except the messages that Alice transmits to Bob. Can she deduce the scheme and decrypt a corpus of messages?
Bob recovers the digits of K from the received string using the known protocol, and re-generates the key K and the secret number exp(Pi * K ) / 4. Then he XORs this with the plain text (remaining after removing the key digits) and recovers the original plain text.
Eve has no information at all except the messages that Alice transmits to Bob. Can she deduce the scheme and decrypt a corpus of messages?
Last edited: