Page 36 - index
P. 36
of the circuit does the information transformation and a memory element is responsible for
the information permutation.
It is obvious that, in such a case, we are getting a constantly changing and quite smart
system that can offer us a dynamic protection. In programming, these could be resolved
using an adaptive algorithm. At this stage, these would be all regarding dynamic
cryptography.
Conclusion
At the end, we could simply ask the question as follows: “Is the future of our digital reality so
dynamic, indeed, or do we need to concentrate to somewhat brighter solutions?” Well, since
our environment is so dynamic and constantly changing, it appear we should try to adapt to
those changes somehow. At the moment, a dynamic encryption seems as a quite good
choice. But, what we would like to mention here the most is that the special attention should
be paid to solution that can assure a perfect secrecy. Why is that important? Well, as it is
known, the key-based options are not that reliable, because there are always ways for a
cryptanalyst to get an information about the cryptosystem’s key and easily break in such a
communication. There are a dozen of very attractive cryptographic softwares available on
the web and they all are normally a key-based. From our perspective, these are the quite
risky and concerning problems. So, that’s how we should think in the future… Yes. We are
dynamic and we need a dynamic protection! But, is that all?
About The Author
Milica Djekic is a graduate of Control Engineering and the current Editor-
in-Chief of Australian Science Magazine, where she writes about her
explorations in the world of cryptography, online security, and wireless
systems. Currently based in Serbia, she works as an Online Marketing
Coordinator for Dejan SEO.
36 Cyber Warnings E-Magazine – July 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide