Commit c21658b7 by Florent Chehab

### remove annexe

parent 07430b0e
 ... ... @@ -66,7 +66,5 @@ \printbibliography \clearpage \subfile{src/appendix} \end{document} \ No newline at end of file
 \begin{appendices} \section{Article : \guill{Communication theory of secrecy system}} \label{app-shannon} Extrait de \cite{shannon1949communication} concernant les critères d'évaluation d'un cryptosystème : \begin{myquote} \begin{itemize} \item 5.1 Amount of Secrecy \\ There are some systems that are perfect—the enemy is no better off after intercepting any amount of material than before. Other systems, although giving him some information, do not yield a unique “solution” to intercepted cryptograms. Among the uniquely solvable systems, there are wide variations in the amount of labor required to effect this solution and in the amount of material that must be intercepted to make the solution unique. 8 This system is trivial from the secrecy standpoint since, with the exception of the first d letters, the enemy is in possession of the entire “key”. 669 \item 5.2 Size of Key \\ The key must be transmitted by non-interceptible means from transmitting to receiving points. Sometimes it must be memorized. It is therefore desirable to have the key as small as possible. \item 5.3 Complexity of Enciphering and Deciphering \\ Operations Enciphering and deciphering should, of course, be as simple as possible. If they are done manually, complexity leads to loss of time, errors, etc. If done mechanically, complexity leads to large expensive machines. \item 5.4 Propagation of Errors \\ In certain types of ciphers an error of one letter in enciphering or transmission leads to a large number of errors in the deciphered text. The error are spread out by the deciphering operation, causing the loss of much information and frequent need for repetition of the cryptogram. It is naturally desirable to minimize this error expansion. \item 5.5 Expansion of Message \\ In some types of secrecy systems the size of the message is increased by the enciphering process. This undesirable effect may be seen in systems where one attempts to swamp out message statistics by the addition of many nulls, or where multiple substitutes are used. It also occurs in many “concealment” types of systems (which are not usually secrecy systems in the sense of our definition). \end{itemize} \end{myquote} \end{appendices} \ No newline at end of file
 ... ... @@ -411,7 +411,7 @@ Shannon adjoint à cette théorie celle de \textit{l'entropie} pour s'attaquer a \bigskip Avec ses nouveaux outils mathématiques Shannon donne les critères principaux pour l'évaluation d'un cryptosystème : le degré de secret permis, la taille de la clé, la complexité pour chiffrer et déchiffrer un message, l'éventuelle propagation d'erreurs et l'effet du cryptosystème sur la longueur du message. La définition complète de ces critères est visible en annexe \ref{app-shannon} page \pageref{app-shannon}. Avec ses nouveaux outils mathématiques Shannon donne les critères principaux pour l'évaluation d'un cryptosystème : le degré de secret permis, la taille de la clé, la complexité pour chiffrer et déchiffrer un message, l'éventuelle propagation d'erreurs et l'effet du cryptosystème sur la longueur du message. Ces 5 critères ne peuvent être simultanément satisfaits, aussi Shannon fait l'analyse suivante : ... ...
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment