Large and complex cryptographic systems are generally comprised of a combination of simple operations, primitives. Distinguished among them are:
Substitution
Transposition
Split/Concatenation
bitwise operations (between two bit strings)
Virtually all symmetric ciphers are constructed with the design motif of a series of primitives wherein the output of one primitive operation serves as input to the other.
|
|