Hoja de Ejercicios 1
Hoja de Ejercicios 1
Hoja de Ejercicios 1
Criptografa
Resolucin de Ejercicios Hoja1
L
1
1
M
1
2
N
1
3
O
1
4
P
1
5
Q
1
6
R
1
7
S
1
8
T
1
9
U
2
0
V
2
1
W
2
2
X
2
3
Y
24
Ejercicio No. 1:
Conocemos que el texto cifrado FTQOAPQNAAWEUYAZEUZST
es la
versin cifrada del ttulo y el autor del libro titulado THE CODE BOOK y que
se ha construido el criptosistema Cesar de sustitucin simple. Quin es el
autor?
F T Q O A P Q N A A W E U Y A Z E U Z S T
T H E C O D E B O O K
Dado que se nos proporciona el ttulo del libro que corresponde a la primera
parte del criptograma, podemos saber, en concreto el valor de K, que
corresponde a las posiciones que se debe desplazar para el cifrado,
pudiendo tomar cualesquiera, as:
Vemos que la letra T corresponde a F en el criptograma, por lo que
debemos contar hacia las posiciones que hay desde T hasta F de izquierda
a derecha en el alfabeto, obtenemos que la distancia es 12, que sera el
valor de K.
K=
12
Ahora aplicamos este desplazamiento obtenido para poder encontrar las
letras no conocidas en el criptograma:
F
T
T Q O A P
H E C O D
Q N A A W E
E B O O K S
U
I
Y A Z
M O N
E
S
U
I
Z
N
S
G
T
H
Z
2
5
)(
K 1= P O = 15 14
O L
14 11
K 2= S
W
)(
I = 18 8
M
22 12
Para que una matriz se pueda usar como clave, debe ser invertible, es decir,
se debe poder obtener su inverso, ya que sin esto el descifrado no es
posible.
1
1
T
( K 1 ) = det ( K 1 )
1
1
( K 1 ) = 15 14 = 3 8
21
( 14 11 ) ( 8 23)
La matriz de la clave
veamos que pasa con
1
1
T
( K 2 ) = det ( K 2 )
1
1
( K 1 ) = 18 22 =?
14
( 8 12)
Ejercicio No. 3
Sabemos que el texto cifrado BHCUYOFVGLMECVJXBW ha sido encriptado
con una matriz de cifrado, con la siguiente clave:
2 18 3
K 3 x 3= 5 7 11
9 14 20
B
C= H
C
U F
Y V
O G
)(
L C X
1 20 5 11 2 23
M V B = 7 24 21 12 21 1
E J W
2 14 6 4 9 22
M =K 1C
12 20 21
K1= 25 13 19
7 4 2
)(
12 20 21 1 20 5 11 2 23
M = 25 13 19 7 24 21 12 21 1
7 4 2
2 14 6 4 9 22
12 0 8 14 9 4
M = 24 12 18 13 0 18
13 4 1 3 12 1
1
2
M
2
4
Y
1
3
N
0
A
1
2
M
1
8
S
1
B
1
4
O
1
3
N
1
2
M
4
E
1
8
S
1
B
I NS
R TO
C GA
D LM
UW
X
Pareja YI:
I NS
R TO
C GA
D LM
UW
X
Pareja CW:
I NS
R TO
C GA
D LM
UW
X
Pareja MD:
I NS
R TO
C GA
D LM
UW
X
Pareja OT:
I NS
R TO
C GA
D LM
UW
X
K
O
X
U
C
A
Y
R
I
E
C
G
W
U
N
I
D
L
O
T
T
Y
Ejercicio No.5:
El siguiente texto en ingls est cifrado con el criptosistema Vigenre,
usando como clave una palabra en ingls:
DZAXVZKSIRPAAVJWTBQELFUQLGCRBOGECDIGNGKVTZFTAAAYSOGOWWDAJBJMPNVZXVQQYX
IMEWPGISAKWPZJJVHWTXEUQQVHCSNITMCOECTGAVLXFBQIRAESMPBPZRTMPAGELFWTQITR
BBQZQQEOMPKTJTUMFUGDWBOGAJLVFLVPGOIDWFQPRXFKJVKBYFVGMFPHUWTMEZZFZVPGZV
JOKVCWMONQZOLXJWPWPWCXQVPKYXFVFMFCIDQRQGYXTBJMTPFZXTMEWYEQPOWYABVVMFAI
SAQVUQVPUFWKYKUPGACXITQPKGHSSTFECCMBVFBJPEEDGVVZJUPGKQXTVBGZVSINMVPQOW
VAGLVZGBZTGQFXDZAXVZPPOAPCGICMEWOPMOKTMCDMOONGEZQQTGFCYHJBUIRAPJKCBKZR
NWTMYTHFARZGLHNWFMTYGSGRBQRVBXJGKDLFIXQNJFBAGLQYQBBJMOLXJKCTVSIPZAIPOG
PURCVPVTKKMPNIQZCKVTGFKTGRESHZCXJTGBTIWTTXIUUITPHFAKOPPHBZQCPOGPURCVLX
JWPINSESLPMUDETAWUREMPVUUCVMOOUCESEMOQZKELNAJITOXPJTMCVMOXTIEEMDMDGCYC
BLXMTDESGKBKDXIMQZGEMDINTAASTAKJNPXPJTMCVWVKJIUJWUMOJWEMUQUQPQIBAKJNPX
PLQAQMCBVASPZAOXTIEEMDINUGLRTBJMUPWDPGUGDESMVPGCIGWTMVPVNMFKQXTVBCBKZR
BTNGUPGVZGBJPSSMVQELPBLXIPNITMIQOAVPDGUGYXTQPQPEIHMTNCNXPZKHCEMPVCTIZV
JBJUULRENCAVPVDWOXWEMOOVMESRPTQOACIRCKZGELFAGAQWYUQQVUESCMEWPEMOCCTNJE
EIRBGOXIMTMGIMTBKVHZVNIVQQYXIMQZGEMDINTADIDCTMUNLFUGAVSEUXTWXLFMGEIPYS
UJGJTZOFVGDGYAJBJCPWMNQVMFNSNXWBKYKQWYMTLRFFCURWIJAVPGZRFBKUGAEEJWBVSI
TMUKJPQFACZGXSSMFQHQMDCNBVZMNXNMOPRUBJIPELFJGAVELFWTMVTGBTNGDCIBSCJNPF
VBEWOAYUIVQQYEMTAAGNYSMOMESEOQUUUELFOTWYELPNEZAAXPOTIRSMDBGKJYSMWIGJLW
SIKAGOEOCOJGCSGTGOCWMTAWMUTRUPGQPQSSUCBKZRBOGKTJTUWIZCALZARWVPRUQCTHZV
VAGIULXPWNNQCITXKWPLKFIPLUPHJBKWPSETTGLOLRZOQDGCRNMPBUESDTCAUTJZQVIULA
FIRWPLREBQTKXMUWTMXPRQZQPKMMUQVAWDIBVFMZASSBKVUZQFRWZKDHJKVQQYWXPGZGEL
FCUMQQGSGRBQRVBXJGKDPFOCTNLATXGZOTXJVXMUEMHIVWTDXPKQURPPUPGLKDGMWUCTPS
GMPKTJTUQQVMPCTNQZFZGVUGVVDVFTGDCYXUWCVKYZFAVQILXJWPKTJTUWIZCALZINAQAP
BGUIOLNPZTWNPMOLKOKEEMZKOJEWNIPIIPQFVVIPOTJZCKAZJEQIQVLPNMFQC
PALABR
A
DZAXV
Z
LFU
GCR
BOG
FRECUEN
CIA
2
DISTANC
IA
364
2
2
3
938
1281
133,
1071
JWP
3
336, 959
Tabla de Patrones encontrados
Ahora con los valores encontrados de las distancias entre los patrones,
obtenemos el mximo comn divisor de todos ellos, que nos permitir
aproximar el tamao de la clave utilizada, as:
DISTANCI
FACTORES
MAXIMO COMN
A
PRIMOS
DIVISOR (M.C.D.)
364
22. 7 . 3
938
2 . 7 . 67
1281
3 . 7 . 61
133
7 . 19
1071
32 . 7 . 17
336
24 . 3 . 7
959
7. 137
Tabla de Factores primero de las distancias entre patrones
C1:
DSJFBGFOJZISJUNCFSTFBOUBFDFFUFJOJXFDTZEBSPUTSBEUVNVBDPCOOQJJNFNSBFBBJPPTQFHBIF
BPJSTPOMNPODBSIDTPVUUBPBODTDSGNVBVSBTPTHPPJEDOPRFUCOEITNIDDFUMUFJNNQFJFETFSDNU
FFBBVUMSOFPPDMSOGTUSBUZUVPTFJTZNDZFEUQUBSFJXFSBFTJHPUMGUTVFUFJUZBPOMNFJEN
C2:
ZIWUONTGBXMAVQITBMMWBMMOLWKVWZONWQVQBXQVAUPQTVDPBMAZZOMKOTBKWAWGXIABKZUKZKZTUA
ZUWLAVOOAJXMLGMIAJKMQALVXIBPMWMBTZMLMDQMZVBNWOTCAQMCIMBIMICUXGJVBQXWFABJMAMCXB
JWTSBITMQONOBWICTAPUOWAQAWXIBTOMTQIBWZQVBRKPCGXOXVIKPWMQNUTWAWWIGZLZIVZQM
C3:
ARTQGGAOJVEKHQTGQPPTQPFGVFJGTVKQPVFRJTPVQFGPFFGGGVGTAAETNGUCTRFRJXGJCARKCTCIUK
QRPPWUUQJTTDXKQNKTJOUKQATNJGVTFCNGVXIGPTKCJCOVQKGQECRTKVQNTGTEGGJVWYCVKWUCFNNJ
GTNCEVAOUTETGIKOGWGCGIRCGNKPKGQPCVRQTQVFKWVGURJCGXVQGUPQQGGCVPINUTKKPVCIF
C4:
XPBLEKAWMQWWWVMAIBAQZKUAPQVMMPVZWPMQMMOMVWAKEBVKZPLGXPWMGFIBMZMBGQLMTICMKGXWIO
CCIMUUCZIMIGMBZTJMIJQJASIUMUPMKBGBQIQUQNHTUAXMOZAVWTBMVQZTMAWIJDCMBMUPUBKZQBMI
AMGJWQAMUWZIKGAJOMQBKZWTINWLWLDBAIWTMPAMVZQZMBGTZMWULCKVZVDVQKZAIWOOIIKQQ
C5:
VAQGCVAWPQPPTHCVRPGIQTGJGPKFEGCOPKFGTEWFUKCGCJVQVQVQVCOCECRKYGTQKNQOVPVPVRJTTP
PVNURCEKTCECTKGANCUWPNQPEGUGGVQKUJEPOGPCCIUVWEAGQUPNGGHQGAUVXPTGPFKTRGGVJGHVOP
VVDNOQGEUYARJJGGCUPKTCVHUQPUPOGUUUPKXKWZUKQGQQKNOUTRKTTMFVCKITCQONKJIPAVC
C6:
ZAECDTYDNYGZXCOLAZETQJDLORBPZZWLWYCYPWYAQYXHCPZXSOZFZGPDZYAZTLYRDJYLSOPNTETTPP
OLSDEVSEOVEYDDEAPVJEQPMZELPDCPXZPPLNAYENEZLPESCEWEEJOIZYEDNSLYZYWNYLWZASPXQZPE
ETCPAYNSEEASYLOCWTQZJAPZLCLPSLCETLLXPMDAZDYEQRDLTEDPDPJPZDYYLJAALPEEPOZL
C7:
KVLRIZSAVXIJESEXERLRETWVIXYHZVMXCXIXFYAIVKISMEJTIWGXPIMMQHPRHHGVLFQXIGVIGSGXHH
GXEEMMELXMMCEXMSXWWMIXCAMRWEIVTRGSPIVXIXMVRVMRILYSMEXMVXMILEFSOAMSKRIREIQSMMRL
LGIFYEYELLXMSWESMRSRTLRVXIKHERRSJARMRMISQHWLGVPAXMXPGSTCGVXZXTLPNMEWQTJP
A
0
1
7
7
B
2
2
1
9
0
1
5
7
1
5
0
1
3
6
C
2
C
3
C
4
C
5
C
6
C
7
C
3
D
1
4
2
E
7
1
7
6
1
9
1
0
4
F
3
0
1
G
4
H
3
I
5
3
1
9
1
1
1
1
5
6
1
6
0
2
5
1
8
2
6
2
1
8
4
1
1
2
1
J
1
7
5
K
0
L
0
M
6
1
2
6
1
7
1
2
1
7
0
2
4
0
6
0
2
1
1
3
3
2
1
N
1
3
5
1
0
2
O
1
3
1
3
5
6
2
5
P
1
8
6
1
4
9
2
3
2
5
7
Q
4
R
1
1
5
1
9
1
7
1
8
6
1
8
S
1
6
1
1
0
0
1
0
1
6
T
1
6
1
3
2
3
8
1
5
1
0
7
U
2
1
8
1
0
1
1
1
7
0
0
V
8
W
0
X
2
Y
0
Z
6
1
2
1
9
1
1
2
1
3
2
0
5
1
1
4
1
4
0
1
8
5
1
6
1
1
5
2
4
2
0
5
2
2
3
PRIMER BLOQUE
Buscamos, la que tenga mayor frecuencia, y asumiremos que es la E, y
aplicamos la distribucin 0 +4 +10 +5, as:
C
A
0
B
2
2
A
C
3
D
1
4
E
7
F
3
0
E
G
4
H
3
I
5
J
1
7
K
0
L
0
M
6
N
1
3
O
1
3
P
1
8
O
Q
4
R
1
S
1
6
T
1
6
U
2
1
T
V
8
W
0
X
2
Y
0
Z
6
L
6
M
2
4
E
N
5
O
1
3
P
6
Q
1
5
R
1
S
1
T
1
3
U
8
V
1
2
W
2
0
O
X
1
1
Y
0
Z
1
4
L
0
M
0
N
1
0
O
5
P
1
4
Q
1
9
O
R
1
0
S
0
T
2
3
U
1
0
V
1
9
T
W
5
X
4
Y
1
Z
0
L
6
M
3
2
E
N
2
O
6
P
9
Q
1
7
R
0
S
1
T
8
U
1
1
V
1
1
W
1
8
O
X
4
Y
0
Z
1
6
L
0
M
1
N
8
O
9
P
2
3
Q
1
8
O
R
7
S
0
T
1
5
U
1
7
V
2
1
T
W
5
X
2
Y
2
Z
1
L
2
1
A
M
2
N
7
O
9
P
2
5
E
Q
6
R
3
S
1
0
T
1
0
U
0
V
3
W
7
X
6
Y
2
0
Z
2
2
O
SEGUNDO BLOQUE
C
2
A
1
7
B
1
9
T
C
6
D
2
E
0
F
1
G
6
H
0
I
1
5
A
J
5
K
9
TERCER BLOQUE
C
A
7
B
0
C
1
7
A
D
1
E
6
F
1
1
G
3
1
E
H
1
I
6
J
1
2
K
1
7
CUARTO BLOQUE
C
4
A
1
5
B
1
5
T
C
6
D
3
E
2
F
1
G
9
H
1
I
1
8
A
J
6
K
1
2
A
7
B
0
C
1
9
A
D
1
E
9
F
5
G
2
6
E
H
4
I
4
J
8
K
1
7
SEXTO BLOQUE
C
6
A
1
3
B
1
C
1
0
D
1
6
E
2
5
T
F
1
G
2
H
1
I
1
J
7
K
0
SEPTIMO BLOQUE
C
7
A
6
B
0
C
4
D
0
E
1
8
A
F
4
G
1
1
H
8
I
2
1
E
J
4
K
4
L
1
3
M
2
5
N
1
O
1
P
7
Q
5
R
1
8
S
1
6
O
T
7
U
0
V
1
5
W
8
X
2
4
T
K
1
1
L
1
2
M
1
3
N
1
4
O
1
5
P
1
6
Q
1
7
R
1
8
S
1
9
T
2
0
U
2
1
V
2
2
W
2
3
X
24
Y
2
5
C
2
4
B
2
5
A
2
6
Para la Clave:
Z Y X WV U T S R Q
1 2 3 4 5 6 7 8 9 1
0
P
1
1
O
1
2
N
1
3
M
1
4
L
1
5
K
1
6
J
1
7
I
1
8
H
1
9
G
2
0
F
2
1
E
2
2
D
2
3
BICICLEBICICLEBICICLEBICICLEBICICLEBICICLEBICICLEBICICLEBICICLE
DZAXVZKSIRPAAVJWTBQELFUQLGCRBOGECDIGNGKVTZFTAAAYSOGOWWDAJBJMPNV
Y
5
Z
3
ZXVQQYXIMEWPGISAKWPZJJVHWTXEUQQVHCSNITMCOECTGAVLXFBQIRAESMPBPZR
TMPAGELFWTQITRBBQZQQEOMPKTJTUMFUGDWBOGAJLVFLVPGOIDWFQPRXFKJVKBY
FVGMFPHUWTMEZZFZVPGZVJOKVCWMONQZOLXJWPWPWCXQVPKYXFVFMFCIDQRQGYX
TBJMTPFZXTMEWYEQPOWYABVVMFAISAQVUQVPUFWKYKUPGACXITQPKGHSSTFECCM
BVFBJPEEDGVVZJUPGKQXTVBGZVSINMVPQOWVAGLVZGBZTGQFXDZAXVZPPOAPCGI
CMEWOPMOKTMCDMOONGEZQQTGFCYHJBUIRAPJKCBKZRNWTMYTHFARZGLHNWFMTYG
SGRBQRVBXJGKDLFIXQNJFBAGLQYQBBJMOLXJKCTVSIPZAIPOGPURCVPVTKKMPNI
QZCKVTGFKTGRESHZCXJTGBTIWTTXIUUITPHFAKOPPHBZQCPOGPURCVLXJWPINSE
SLPMUDETAWUREMPVUUCVMOOUCESEMOQZKELNAJITOXPJTMCVMOXTIEEMDMDGCYC
BLXMTDESGKBKDXIMQZGEMDINTAASTAKJNPXPJTMCVWVKJIUJWUMOJWEMUQUQPQI
BAKJNPXPLQAQMCBVASPZAOXTIEEMDINUGLRTBJMUPWDPGUGDESMVPGCIGWTMVPV
NMFKQXTVBCBKZRBTNGUPGVZGBJPSSMVQELPBLXIPNITMIQOAVPDGUGYXTQPQPEI
HMTNCNXPZKHCEMPVCTIZVJBJUULRENCAVPVDWOXWEMOOVMESRPTQOACIRCKZGEL
FAGAQWYUQQVUESCMEWPEMOCCTNJEEIRBGOXIMTMGIMTBKVHZVNIVQQYXIMQZGEM
DINTADIDCTMUNLFUGAVSEUXTWXLFMGEIPYSUJGJTZOFVGDGYAJBJCPWMNQVMFNS
NXWBKYKQWYMTLRFFCURWIJAVPGZRFBKUGAEEJWBVSITMUKJPQFACZGXSSMFQHQM
DCNBVZMNXNMOPRUBJIPELFJGAVELFWTMVTGBTNGDCIBSCJNPFVBEWOAYUIVQQYE
MTAAGNYSMOMESEOQUUUELFOTWYELPNEZAAXPOTIRSMDBGKJYSMWIGJLWSIKAGOE
OCOJGCSGTGOCWMTAWMUTRUPGQPQSSUCBKZRBOGKTJTUWIZCALZARWVPRUQCTHZV
VAGIULXPWNNQCITXKWPLKFIPLUPHJBKWPSETTGLOLRZOQDGCRNMPBUESDTCAUTJ
ZQVIULAFIRWPLREBQTKXMUWTMXPRQZQPKMMUQVAWDIBVFMZASSBKVUZQFRWZKDH
JKVQQYWXPGZGELFCUMQQGSGRBQRVBXJGKDPFOCTNLATXGZOTXJVXMUEMHIVWTDX
PKQURPPUPGLKDGMWUCTPSGMPKTJTUQQVMPCTNQZFZGVUGVVDVFTGDCYXUWCVKYZ
FAVQILXJWPKTJTUWIZCALZINAQAPBGUIOLNPZTWNPMOLKOKEEMZKOJEWNIPIIPQ
FVVIPOTJZCKAZJEQIQVLPNMFQC
CLA
VE
CRYPTOGRAPHYPRIORTOTHEMODERNAGEWASEFFECTIVELYSYNONYMOUSWITHENCRY
PTIONTHECONVERSIONOFINFORMATIONFROMAREADABLESTATETOAPPARENTNONSE
NSETHEORIGINATOROFANENCRYPTEDMESSAGESHAREDTHEDECODINGTECHNIQUENE
EDEDTORECOVERTHEORIGINALINFORMATIONONLYWITHINTENDEDRECIPIENTSTHE
REBYPRECLUDINGUNWANTEDPERSONSFROMDOINGTHESAMESINCEWORLDWARIANDTH
EADVENTOFTHECOMPUTERTHEMETHODSUSEDTOCARRYOUTCRYPTOLOGYHAVEBECOME
INCREASINGLYCOMPLEXANDITSAPPLICATIONMOREWIDESPREADMODERNCRYPTOGR
APHYISHEAVILYBASEDONMATHEMATICALTHEORYANDCOMPUTERSCIENCEPRACTICE
CRYPTOGRAPHICALGORITHMSAREDESIGNEDAROUNDCOMPUTATIONALHARDNESSASS
UMPTIONSMAKINGSUCHALGORITHMSHARDTOBREAKINPRACTICEBYANYADVERSARYI
TISTHEORETICALLYPOSSIBLETOBREAKSUCHASYSTEMBUTITISINFEASIBLETODOS
OBYANYKNOWNPRACTICALMEANSTHESESCHEMESARETHEREFORETERMEDCOMPUTATI
ONALLYSECURETHEORETICALADVANCESEGIMPROVEMENTSININTEGERFACTORIZAT
IONALGORITHMSANDFASTERCOMPUTINGTECHNOLOGYREQUIRETHESESOLUTIONSTO
BECONTINUALLYADAPTEDTHEREEXISTINFORMATIONTHEORETICALLYSECURESCHE
MESTHATPROVABLYCANNOTBEBROKENEVENWITHUNLIMITEDCOMPUTINGPOWERANEX
AMPLEISTHEONETIMEPADBUTTHESESCHEMESAREMOREDIFFICULTTOIMPLEMENTTH
ANTHEBESTTHEORETICALLYBREAKABLEBUTCOMPUTATIONALLYSECUREMECHANISM
STHEGROWTHOFCRYPTOGRAPHICTECHNOLOGYHASRAISEDANUMBEROFLEGALISSUES
INTHEINFORMATIONAGECRYPTOGRAPHYSPOTENTIALFORUSEASATOOLFORESPIONA
GEANDSEDITIONHASLEDMANYGOVERNMENTSTOCLASSIFYITASAWEAPONANDTOLIMI
TOREVENPROHIBITITSUSEANDEXPORTINSOMEJURISDICTIONSWHERETHEUSEOFCR
YPTOGRAPHYISLEGALLAWSPERMITINVESTIGATORSTOCOMPELTHEDISCLOSUREOFE
NCRYPTIONKEYSFORDOCUMENTSRELEVANTTOANINVESTIGATIONCRYPTOGRAPHYAL
SOPLAYSAMAJORROLEINDIGITALRIGHTSMANAGEMENTANDPIRACYOFDIGITALMEDI
A
Al cual agregando lo espacios correspondientes quedara as:
CRYPTOGRAPHY PRIOR TO THE MODERN AGE WAS EFFECTIVELY
SYNONYMOUS WITH ENCRYPTION THE CONVERSION OF INFORMATION
FROM A READABLE STATE TO APPARENT NONSENSE THE ORIGINATOR OF
AN ENCRYPTED MESSAGE SHARED THE DECODING TECHNIQUE NEEDED TO
RECOVER THE ORIGINAL INFORMATION ONLY WITH INTENDED RECIPIENTS
THEREBY PRECLUDING UNWANTED PERSONS FROM DOING THE SAME
SINCE WORLD WAR I AND THE ADVENT OF THE COMPUTER THE METHODS
USED TO CARRY OUT CRYPTOLOGY HAVE BECOME INCREASINGLY COMPLEX
AND ITS APPLICATION MORE WIDESPREAD MODERN CRYPTOGRAPHY IS
HEAVILY BASED ON MATHEMATICAL THEORY AND COMPUTER SCIENCE
PRACTICE CRYPTOGRAPHIC ALGORITHMS ARE DESIGNED AROUND
COMPUTATIONAL HARDNESS ASSUMPTIONS MAKING SUCH ALGORITHMS
HARD TO BREAK IN PRACTICE BY ANY ADVERSARY IT IS THEORETICALLY
POSSIBLE TO BREAK SUCH A SYSTEM BUT IT IS INFEASIBLE TO DO SO BY
ANY KNOWN PRACTICAL MEANS THESE SCHEMES ARE THEREFORE TERMED
COMPUTATIONALLY SECURE THEORETICAL ADVANCES EG IMPROVEMENTS
IN INTEGER FACTORIZATION ALGORITHMS AND FASTER COMPUTING
TECHNOLOGY REQUIRE THESE SOLUTIONS TO BE CONTINUALLY ADAPTED
THERE EXIST INFORMATION THEORETICALLY SECURE SCHEMES THAT
PROVABLY CANNOT BE BROKEN EVEN WITH UNLIMITED COMPUTING
POWER AN EXAMPLE IS THE ONE TIME PAD BUT THESE SCHEMES ARE
MORE DIFFICULT TO IMPLEMENT THAN THE BEST THEORETICALLY
BREAKABLE BUT COMPUTATIONALLY SECURE MECHANISMS THE GROWTH
OF CRYPTOGRAPHIC TECHNOLOGY HAS RAISED A NUMBER OF LEGAL
ISSUES IN THE INFORMATION AGE CRYPTOGRAPHYS POTENTIAL FOR USE
AS A TOOL FOR ESPIONAGE AND SEDITION HAS LED MANY GOVERNMENTS
TO CLASSIFY IT AS A WEAPON AND TO LIMIT OR EVEN PROHIBIT ITS USE
AND EXPORT IN SOME JURISDICTIONS WHERE THE USE OF CRYPTOGRAPHY
IS LEGAL LAWS PERMIT INVESTIGATORS TO COMPEL THE DISCLOSURE OF
ENCRYPTION KEYS FOR DOCUMENTS RELEVANT TO AN INVESTIGATION
CRYPTOGRAPHY ALSO PLAYS A MAJOR ROLE IN DIGITAL RIGHTS
MANAGEMENT AND PIRACY OF DIGITAL MEDIA