Cryptography: New Applications
http://www.maplesoft.com/applications/category.aspx?cid=135
en-us2017 Maplesoft, A Division of Waterloo Maple Inc.Maplesoft Document SystemSun, 30 Apr 2017 20:31:33 GMTSun, 30 Apr 2017 20:31:33 GMTNew applications in the Cryptography categoryhttp://www.mapleprimes.com/images/mapleapps.gifCryptography: New Applications
http://www.maplesoft.com/applications/category.aspx?cid=135
Strong Cryptographic Protection of Folders Using Fast Byte-Oriented Stream-Cipher with Addition in GF(256) and Key Length 2048 Bits
http://www.maplesoft.com/applications/view.aspx?SID=154117&ref=Feed
This application provides a user-friendly, mouse-driven encryption program that can be used to protect an entire folder of information at one time, including information stored in a cloud, on a hard disk, and on pendrives. It is suitable for use by anyone who has a need to protect information stored on their computers. The algorithm used is a fast byte-oriented stream-cipher that performs addition operations in GF(256) and uses a secret key of length 2048 bits.<img src="/view.aspx?si=154117/bca image.png" alt="Strong Cryptographic Protection of Folders Using Fast Byte-Oriented Stream-Cipher with Addition in GF(256) and Key Length 2048 Bits" align="left"/>This application provides a user-friendly, mouse-driven encryption program that can be used to protect an entire folder of information at one time, including information stored in a cloud, on a hard disk, and on pendrives. It is suitable for use by anyone who has a need to protect information stored on their computers. The algorithm used is a fast byte-oriented stream-cipher that performs addition operations in GF(256) and uses a secret key of length 2048 bits.154117Thu, 09 Jun 2016 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyCryptographic Protection of E-Mail Attachment with Filename Extensions `txt`, `doc`, `docx`, `rtf` or `mw` Using the Secret Key of Length 1980 Bits
http://www.maplesoft.com/applications/view.aspx?SID=154109&ref=Feed
This worksheet contains an easy-to-use applications for encrypting and decrypting email attachments to ensure the security of confidential information. It can be used with Word, text, RTF, and Maple documents. The key space used by the algorithms is huge (1980 bits), therefore, the encrypted contents of the file is in practice unbreakable.<img src="/view.aspx?si=154109/tk1980b64.jpg" alt="Cryptographic Protection of E-Mail Attachment with Filename Extensions `txt`, `doc`, `docx`, `rtf` or `mw` Using the Secret Key of Length 1980 Bits" align="left"/>This worksheet contains an easy-to-use applications for encrypting and decrypting email attachments to ensure the security of confidential information. It can be used with Word, text, RTF, and Maple documents. The key space used by the algorithms is huge (1980 bits), therefore, the encrypted contents of the file is in practice unbreakable.154109Mon, 23 May 2016 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyTransport Encoding/Decoding and Cryptographic Protection of Computer Storage
http://www.maplesoft.com/applications/view.aspx?SID=154088&ref=Feed
This worksheet contains two user-friendly useful applications for encrypting personal files. One is useful for encoding arbitrary binary information, such as, for example, *.exe files, encrypted messages, cryptographic keys and audio and image files, for transmission by electronic mail. The second application provides an easy mechanism for non-computer science specialists to protect confidential data stored on their computers.<img src="/view.aspx?si=154088/cspr.jpg" alt="Transport Encoding/Decoding and Cryptographic Protection of Computer Storage" align="left"/>This worksheet contains two user-friendly useful applications for encrypting personal files. One is useful for encoding arbitrary binary information, such as, for example, *.exe files, encrypted messages, cryptographic keys and audio and image files, for transmission by electronic mail. The second application provides an easy mechanism for non-computer science specialists to protect confidential data stored on their computers.154088Thu, 21 Apr 2016 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyByte Frequency Analyzer
http://www.maplesoft.com/applications/view.aspx?SID=153920&ref=Feed
In the cryptographic research an important operation is to determine the byte-frequency of non-encrypted and encrypted files. This action allows us to appraise the quality of the cryptographic algorithms. This application implements a `byte-frequency analyzer` in Maple. Results are displayed in column graphs, using both linear and logarithmic scales on the y-axis. The logarithmic y-axis is very useful if the differences between the byte values are large. The displayed column graphs can be exported in six formats (Bitmap, PNG, GIF, JPEG, Encapsulated Postcript, PDF and Windows Metafile) for use in documents concerning cryptography and file processing tools.<img src="/view.aspx?si=153920/bytefreq.png" alt="Byte Frequency Analyzer" align="left"/>In the cryptographic research an important operation is to determine the byte-frequency of non-encrypted and encrypted files. This action allows us to appraise the quality of the cryptographic algorithms. This application implements a `byte-frequency analyzer` in Maple. Results are displayed in column graphs, using both linear and logarithmic scales on the y-axis. The logarithmic y-axis is very useful if the differences between the byte values are large. The displayed column graphs can be exported in six formats (Bitmap, PNG, GIF, JPEG, Encapsulated Postcript, PDF and Windows Metafile) for use in documents concerning cryptography and file processing tools.153920Thu, 12 Nov 2015 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyThe SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions
http://www.maplesoft.com/applications/view.aspx?SID=153903&ref=Feed
The National Institute of Standards and Technology (NIST) has released the final version of its "Secure Hash Algorithm-3" (SHA-3) standard in August 2015. The new standard ("Federal Information Processing Standard (FIPS) 202") specifies four cryptographic hash functions, called SHA3-224, SHA3-256, SHA3-384 and SHA3-512, as well as two Extendable-Output Functions (XOFs), called SHAKE128 and SHAKE256. These functions are based on the Keccak sponge function, designed by G. Bertoni, J. Daemen, M. Peeters and G. Van Assche. The hash functions are an essential tool for securing the integrity of electronic information and the XOFs offer the added flexibility of having a variable output length. This application contains an implementation of these functions and also of the SHA-3-based Message Authentication Code HMAC.<img src="/view.aspx?si=153903/keccak.jpg" alt="The SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions" align="left"/>The National Institute of Standards and Technology (NIST) has released the final version of its "Secure Hash Algorithm-3" (SHA-3) standard in August 2015. The new standard ("Federal Information Processing Standard (FIPS) 202") specifies four cryptographic hash functions, called SHA3-224, SHA3-256, SHA3-384 and SHA3-512, as well as two Extendable-Output Functions (XOFs), called SHAKE128 and SHAKE256. These functions are based on the Keccak sponge function, designed by G. Bertoni, J. Daemen, M. Peeters and G. Van Assche. The hash functions are an essential tool for securing the integrity of electronic information and the XOFs offer the added flexibility of having a variable output length. This application contains an implementation of these functions and also of the SHA-3-based Message Authentication Code HMAC.153903Fri, 16 Oct 2015 04:00:00 ZJosé Luis Gómez PardoJosé Luis Gómez PardoElGamal E-mail Encryption Scheme
http://www.maplesoft.com/applications/view.aspx?SID=153538&ref=Feed
<p>The submission shows how to implement the user-friendly, but mathematically sophisticated strong e-mail encryption scheme using the ElGamal algorithm working in the multiplicative group of GF(p^m) (http://www.maplesoft.com/applications/view.aspx?SID=4403, J. L. G. Pardo - Introduction to Cryptography with Maple). On unpacking the file `elgmail.zip` the user will see three public key files: `ElGpub_Eve_Flower.m`, `ElGpub_Jack_Herod.m`, `ElGpub_Michele_Lazy.m` and three application worksheets: `ElGedm_Flower.mw`, `ElGedm_Herod.mw`, `ElGedm_Lazy.mw` in which the proper private keys are embedded. Each of the three users can encrypt an e-mail letter and can send the encrypted message to the required addressee, knowing its public key. Evidently, any user can also decrypt the proper encrypted message, addressed to him. The way of generating the public and private keys demonstrates the worksheet ElGkg.mw. The data contained in the names of the computed keys using the worksheet ElGkg.mw is evident. In the presented example the e-mail message should contain no more than 782 printable characters with byte values less than 127. The scheme can be accepted for any e-mail system: the public keys and encrypted messages are Maple `*.m` format files containing characters with 91 byte values from the set {10, 33 .. 122}. The user can also observe the time needed for encryption, decryption and the computation of keys, and the encryption scheme redundancy. An example test message and its cryptogram is also presented and the user can check for which the encrypted test message ought to be sent.</p><img src="/view.aspx?si=153538/image.PNG" alt="ElGamal E-mail Encryption Scheme" align="left"/><p>The submission shows how to implement the user-friendly, but mathematically sophisticated strong e-mail encryption scheme using the ElGamal algorithm working in the multiplicative group of GF(p^m) (http://www.maplesoft.com/applications/view.aspx?SID=4403, J. L. G. Pardo - Introduction to Cryptography with Maple). On unpacking the file `elgmail.zip` the user will see three public key files: `ElGpub_Eve_Flower.m`, `ElGpub_Jack_Herod.m`, `ElGpub_Michele_Lazy.m` and three application worksheets: `ElGedm_Flower.mw`, `ElGedm_Herod.mw`, `ElGedm_Lazy.mw` in which the proper private keys are embedded. Each of the three users can encrypt an e-mail letter and can send the encrypted message to the required addressee, knowing its public key. Evidently, any user can also decrypt the proper encrypted message, addressed to him. The way of generating the public and private keys demonstrates the worksheet ElGkg.mw. The data contained in the names of the computed keys using the worksheet ElGkg.mw is evident. In the presented example the e-mail message should contain no more than 782 printable characters with byte values less than 127. The scheme can be accepted for any e-mail system: the public keys and encrypted messages are Maple `*.m` format files containing characters with 91 byte values from the set {10, 33 .. 122}. The user can also observe the time needed for encryption, decryption and the computation of keys, and the encryption scheme redundancy. An example test message and its cryptogram is also presented and the user can check for which the encrypted test message ought to be sent.</p>153538Wed, 02 Apr 2014 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyGeneralized byte-oriented fast stream cipher that is resistant to reverse engineering
http://www.maplesoft.com/applications/view.aspx?SID=153499&ref=Feed
<p>A new numerous family of strong, to reverse engineering resistant, and fast byte-oriented stream-ciphers has been presented. One ought to unpack the file gbosc.zip, open the worksheet gbosc.mw in the Maple session, read it and test the application described.</p><img src="/applications/images/app_image_blank_lg.jpg" alt="Generalized byte-oriented fast stream cipher that is resistant to reverse engineering" align="left"/><p>A new numerous family of strong, to reverse engineering resistant, and fast byte-oriented stream-ciphers has been presented. One ought to unpack the file gbosc.zip, open the worksheet gbosc.mw in the Maple session, read it and test the application described.</p>153499Tue, 28 Jan 2014 05:00:00 ZCzeslaw KoscielnyCzeslaw Koscielnychiffrer avec le Code de César en utilisant une clé-phrase
http://www.maplesoft.com/applications/view.aspx?SID=142952&ref=Feed
<p>Cette Maplet utilise une version améliorée du Code de César utilisant une clé-phrase.<br />explications:<br />on prend par exemple avec la clé : "cle"<br />"message codé"</p>
<p> clecleclecle</p>
<p>le m va etre codé avec mon alphabet commençant par c:le i ème caractère de abcdef...... devient le i ème caractère de cdefgh.....<br />le e va etre codé avec mon alphabet commençant par l.</p>
<p>etc...</p>
<p>NB: La clé et le message doivent etre de type "phrase" (string)</p><img src="/view.aspx?si=142952/CaptCesar.JPG" alt="chiffrer avec le Code de César en utilisant une clé-phrase" align="left"/><p>Cette Maplet utilise une version améliorée du Code de César utilisant une clé-phrase.<br />explications:<br />on prend par exemple avec la clé : "cle"<br />"message codé"</p>
<p> clecleclecle</p>
<p>le m va etre codé avec mon alphabet commençant par c:le i ème caractère de abcdef...... devient le i ème caractère de cdefgh.....<br />le e va etre codé avec mon alphabet commençant par l.</p>
<p>etc...</p>
<p>NB: La clé et le message doivent etre de type "phrase" (string)</p>142952Fri, 01 Feb 2013 05:00:00 Zxavier cormierxavier cormierThe Advanced Encryption Standard and its modes of operation
http://www.maplesoft.com/applications/view.aspx?SID=6618&ref=Feed
<p>This is an update, labeled version 1.1, to the existing application The Advanced Encryption Standard and its modes of operation.</p>
<p>Version 1.1: Key generation function and related functions updated to facilitate the use of externally generated seeds. Some minor changes to presentation.</p>
<p>Version 1.0: Implementation of encryption and authentication schemes that use the Advanced Encryption Standard (AES) as their underlying block cipher. These schemes are constructed by using all the modes of operation for block ciphers so far approved by NIST (the US National Institute of Standards of Technology), namely, the five confidentiality modes: ECB, CBC, CFB, OFB and CTR, the authentication mode CMAC, and the "authenticated encryption" modes CCM and GCM/GMAC. The implementation is able to encrypt/decrypt and/or authenticate messages in several formats, including binary files, and we use it to explore the basic properties of these schemes. The implementation contains also detailed explanations of all the procedures used, including the lower level ones, and discusses both the programming and the cryptographic aspects involved.</p><img src="/view.aspx?si=6618/AES_1608.gif" alt="The Advanced Encryption Standard and its modes of operation" align="left"/><p>This is an update, labeled version 1.1, to the existing application The Advanced Encryption Standard and its modes of operation.</p>
<p>Version 1.1: Key generation function and related functions updated to facilitate the use of externally generated seeds. Some minor changes to presentation.</p>
<p>Version 1.0: Implementation of encryption and authentication schemes that use the Advanced Encryption Standard (AES) as their underlying block cipher. These schemes are constructed by using all the modes of operation for block ciphers so far approved by NIST (the US National Institute of Standards of Technology), namely, the five confidentiality modes: ECB, CBC, CFB, OFB and CTR, the authentication mode CMAC, and the "authenticated encryption" modes CCM and GCM/GMAC. The implementation is able to encrypt/decrypt and/or authenticate messages in several formats, including binary files, and we use it to explore the basic properties of these schemes. The implementation contains also detailed explanations of all the procedures used, including the lower level ones, and discusses both the programming and the cryptographic aspects involved.</p>6618Mon, 20 Jun 2011 04:00:00 ZJosé Luis Gómez PardoJosé Luis Gómez PardoRSA with maple
http://www.maplesoft.com/applications/view.aspx?SID=100620&ref=Feed
<h3>The purpose of this<strong> worksheet is to show how can maple be applied to ease the cryptography of messages</strong></h3><img src="/view.aspx?si=100620/maple_icon.jpg" alt="RSA with maple" align="left"/><h3>The purpose of this<strong> worksheet is to show how can maple be applied to ease the cryptography of messages</strong></h3>100620Tue, 04 Jan 2011 05:00:00 ZAli Abu OamAli Abu OamUser Friendly Maple Tools for Preliminary Cryptanalysis
http://www.maplesoft.com/applications/view.aspx?SID=98016&ref=Feed
<p>In this application the easy to use tool has been presented. The user can generate histograms, visualizing the main statistical properties of a selected disk file, by means of the mouse only.</p><img src="/view.aspx?si=98016/maple_icon.jpg" alt="User Friendly Maple Tools for Preliminary Cryptanalysis" align="left"/><p>In this application the easy to use tool has been presented. The user can generate histograms, visualizing the main statistical properties of a selected disk file, by means of the mouse only.</p>98016Thu, 21 Oct 2010 04:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw KoscielnyMaplets for Using and Exploring a Symmetric-Key Block Cipher Generating Cryptograms with Defined Set of Characters
http://www.maplesoft.com/applications/view.aspx?SID=34939&ref=Feed
<p>Maplets for Using and Exploring a Symmetric-Key Block Cipher Generating Cryptograms with Defined Set of Characters.</p>
<p>Unpack the file foac.zip, open the file foap.mw and explore the cipher.</p><img src="/view.aspx?si=34939/0\foac/ptf/m.jpg" alt="Maplets for Using and Exploring a Symmetric-Key Block Cipher Generating Cryptograms with Defined Set of Characters" align="left"/><p>Maplets for Using and Exploring a Symmetric-Key Block Cipher Generating Cryptograms with Defined Set of Characters.</p>
<p>Unpack the file foac.zip, open the file foap.mw and explore the cipher.</p>34939Wed, 09 Dec 2009 05:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw KoscielnyMLF/MIFF Public-Key Steganocryptography Destined for E-mail Protection
http://www.maplesoft.com/applications/view.aspx?SID=7251&ref=Feed
An easy to use maplet application based on MLF/MIFF public-key steganocryptography for very safe e-mail cryptographic protection. The abbreviation MLF/MIFF stands for Maple language file/Maple internal format file because the delivered software converts any plaintext file of any format containing text, image, voice or music into the cryptogram in the form of a Maple language file or Maple internal format file and restores the plaintext message from the cryptogram. The cryptogram is generated using the generalized ElGamal system.
Instructions: Unpack the file gelg.zip, open the worksheet gelgexpl.mw, and follow the instructons contained inside.<img src="/view.aspx?si=7251//applications/images/app_image_blank_lg.jpg" alt="MLF/MIFF Public-Key Steganocryptography Destined for E-mail Protection" align="left"/>An easy to use maplet application based on MLF/MIFF public-key steganocryptography for very safe e-mail cryptographic protection. The abbreviation MLF/MIFF stands for Maple language file/Maple internal format file because the delivered software converts any plaintext file of any format containing text, image, voice or music into the cryptogram in the form of a Maple language file or Maple internal format file and restores the plaintext message from the cryptogram. The cryptogram is generated using the generalized ElGamal system.
Instructions: Unpack the file gelg.zip, open the worksheet gelgexpl.mw, and follow the instructons contained inside.7251Wed, 18 Feb 2009 00:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw KoscielnyCryptographic Protection of Definite PC Directory Using the AES Algorithm
http://www.maplesoft.com/applications/view.aspx?SID=7086&ref=Feed
It has been shown how to use the AES algorithm for cryptographic protection of files stored in the definite directory of the PC hard disk by means of the user-friendly maplets.<img src="/view.aspx?si=7086/1.jpg" alt="Cryptographic Protection of Definite PC Directory Using the AES Algorithm" align="left"/>It has been shown how to use the AES algorithm for cryptographic protection of files stored in the definite directory of the PC hard disk by means of the user-friendly maplets.7086Tue, 06 Jan 2009 00:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw KoscielnyGrayscale Image Steganography
http://www.maplesoft.com/applications/view.aspx?SID=6878&ref=Feed
A new way of steganography consisting in converting an arbitrary message file of any format into a steganogram having the form of grayscale image file (tif or bmp) has been presented. It also has been shown how to protect disk files against unauthorized access using the delivered software.<img src="/view.aspx?si=6878/gsish_1.gif" alt="Grayscale Image Steganography" align="left"/>A new way of steganography consisting in converting an arbitrary message file of any format into a steganogram having the form of grayscale image file (tif or bmp) has been presented. It also has been shown how to protect disk files against unauthorized access using the delivered software.6878Tue, 11 Nov 2008 00:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw KoscielnyDifferential Equations
http://www.maplesoft.com/applications/view.aspx?SID=6536&ref=Feed
This set of class notes were developed over many years of teaching Differential Equations to the Engineering students (and some others) at NSAC. It consists of a table of contents linked to 8 other worksheets (cpt 1 notes - cpt 8 notes). The topics are those found in a standard Introduction to Differential Equations course starting with an Introduction through to Fourier Series Methods. These notes are also accompanied by a solutions manual for the exercises found in the various sections of the notes.
I hope they will be as useful for you and your students as they have been for mine.<img src="/view.aspx?si=6536/Untitled-1.jpg" alt="Differential Equations" align="left"/>This set of class notes were developed over many years of teaching Differential Equations to the Engineering students (and some others) at NSAC. It consists of a table of contents linked to 8 other worksheets (cpt 1 notes - cpt 8 notes). The topics are those found in a standard Introduction to Differential Equations course starting with an Introduction through to Fourier Series Methods. These notes are also accompanied by a solutions manual for the exercises found in the various sections of the notes.
I hope they will be as useful for you and your students as they have been for mine.6536Thu, 07 Aug 2008 00:00:00 ZProf. Carl MadiganProf. Carl MadiganA Symmetric-Key Block Cipher Generating Cryptograms Containing Characters Belonging to the Definite Set
http://www.maplesoft.com/applications/view.aspx?SID=5646&ref=Feed
A new conception of strong symmetric-key block cipher of byte-oriented architecture has been
presented. The application is intended as an initial step on the way at the end of which cryptography and steganography converge. The issue is that the encryption procedure should be able to turn a plaintext file into a cryptogram in the form of a file containing quite reasonable message but unrelated to the plaintext file. For example, we could want to convert a phone call
representing the plaintext file into the cryptogram file being the photo of a spacecraft. After such action the cryptogram is quite different from classic cryptograms looking usually as outputs
of random ASCII characters generator. The method of encryption presented here produces cryptogram files comprised of characters which belong to the set determined by the cryptographic key, using the operations of conversion between bases and substitution. In general, the cipher is redundant, i.e. the size of the cryptogram file is usually greater than that of the plaintext file.<img src="/view.aspx?si=5646/m.jpg" alt="A Symmetric-Key Block Cipher Generating Cryptograms Containing Characters Belonging to the Definite Set" align="left"/>A new conception of strong symmetric-key block cipher of byte-oriented architecture has been
presented. The application is intended as an initial step on the way at the end of which cryptography and steganography converge. The issue is that the encryption procedure should be able to turn a plaintext file into a cryptogram in the form of a file containing quite reasonable message but unrelated to the plaintext file. For example, we could want to convert a phone call
representing the plaintext file into the cryptogram file being the photo of a spacecraft. After such action the cryptogram is quite different from classic cryptograms looking usually as outputs
of random ASCII characters generator. The method of encryption presented here produces cryptogram files comprised of characters which belong to the set determined by the cryptographic key, using the operations of conversion between bases and substitution. In general, the cipher is redundant, i.e. the size of the cryptogram file is usually greater than that of the plaintext file.5646Thu, 07 Feb 2008 00:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw KoscielnyProtection of Disk Files Against Unauthorized Access
http://www.maplesoft.com/applications/view.aspx?SID=5085&ref=Feed
One of many possible user-friendly implementations of byte-oriented and practically unbreakable quasigroup-based stream-cipher has been presented. Using this worksheet the reader can also verify statistical properties of plain texts and cryptograms.
Unpack the zip file on disk C, open the worksheet C:/cryptor/ecf.mw, read it and execute.<img src="/view.aspx?si=5085//applications/images/app_image_blank_lg.jpg" alt="Protection of Disk Files Against Unauthorized Access" align="left"/>One of many possible user-friendly implementations of byte-oriented and practically unbreakable quasigroup-based stream-cipher has been presented. Using this worksheet the reader can also verify statistical properties of plain texts and cryptograms.
Unpack the zip file on disk C, open the worksheet C:/cryptor/ecf.mw, read it and execute.5085Wed, 11 Jul 2007 00:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyGenAES Package
http://www.maplesoft.com/applications/view.aspx?SID=4882&ref=Feed
The GenAES package is a collection of routines for exploring AES, for computer-aided design related to AES strong symmetric-key block ciphers which allow to encrypt 128-bit block of data with the key of length from 128 to 3736 bits, and for encrypting files by means of the conventional and modified form of this algorithm, using Maple. The package is a noteworthy tool suitable for those engineers, teachers and students who deal with algebraic methods of strong symmetric-key block ciphers design.<img src="/applications/images/app_image_blank_lg.jpg" alt="GenAES Package" align="left"/>The GenAES package is a collection of routines for exploring AES, for computer-aided design related to AES strong symmetric-key block ciphers which allow to encrypt 128-bit block of data with the key of length from 128 to 3736 bits, and for encrypting files by means of the conventional and modified form of this algorithm, using Maple. The package is a noteworthy tool suitable for those engineers, teachers and students who deal with algebraic methods of strong symmetric-key block ciphers design.4882Sun, 11 Mar 2007 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyUsing the GenDES Package to Experiment With DES-768 Encryption
http://www.maplesoft.com/applications/view.aspx?SID=4875&ref=Feed
It has been shown in the worksheet how to apply DES using the GenDES package for encryption 64-bit blocks of data with the secret key length equal to maximum 768 bits<img src="/view.aspx?si=4875//applications/images/app_image_blank_lg.jpg" alt="Using the GenDES Package to Experiment With DES-768 Encryption" align="left"/>It has been shown in the worksheet how to apply DES using the GenDES package for encryption 64-bit blocks of data with the secret key length equal to maximum 768 bits4875Tue, 27 Feb 2007 00:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw Koscielny