1. The reading seemed pretty straightforward, but I always struggle with how to attack the various cyphers we look at. For the One-Time-Pad it seems to me the way of attacking it as explained was to generate random lines of bits of various lengths. My thought was that this seems like a very arbitrary way of attacking ANY sort of code. In addition, if this is the way of attacking, isn't it going to take FOREVER to randomly produce the key? Even with a computer it seems like this method would take a long time.
2. Upon reflection of the cryptosystems introduced in this reading, I thought about the high applicability in the world of computers. Encrypting bits is perfect for sending lots of information across cyber networks. Not only because that is how computers communicate information, but because, as mentioned above, it seems like computers would be the only practical way of attempting to crack the codes.
No comments:
Post a Comment