How are keys used in encryption algorithms?

I browsed and found good articles about encryption. However, none of them explained why the key length is important and why the key is used. I assume this might work as follows:

Plaintext:   0101001101010101010
Key:         01010010101010010101   //the longer the key, the longer unique sequence
XOR or smth: //result

Is it even a little bit, how does it work, or am I missing something?

+3
source share
3 answers

Encryption systems are generally much more complex than the XOR system you described. In fact, XORing really only works if you have a key that has at least as many bits as a text message, and you only ever use the key to encrypt a single message. This is called a "one-time keyboard."

, . , . , , , , , . , , " ".

( ), , . , . , (, ), "" (, ).

, "" . , , , . .

+5

( 25 ) , .

, , Vigenere, . - - . , "dog" "cat" "foz" ( ).

- - , . , , , , ; , , . ( , xor ). , .

+1

. - , , , . "", , , , , .

" ", , . - " " : - ( ), - ( , ). , ; - , . : . , ... , , , , , -, ..

. , , .

XOR : " XOR ", - , XOR. , XOR ( , , , , , ). " " .

? , , , , , - . - : . . , 10- 1024 . 20- 1048576 . .

"", . - , , , "", . , , . " ", , " ". , , - 64- . (18446744073709551616), ( ). , , . , 1 12-18 ( " " ). , 2020 (, , ), - . 100- ( , 10 ). 128- , "128" .

. : - , , (), . , , , -, , , , , . . , , . , , , . , , . , "1024- RSA". RSA , , . 1024- ( , , , 1024 ), 300 ) , ( 768- ).

+1
source

Source: https://habr.com/ru/post/1736763/


All Articles