DBPBE Single Byte Example
These examples will follow the same step numbers shown in the specifications.
Note: The values used in this example are extremely small to be able to do easy calculations and have small graphs. Encryption
1.
Ok, lets say we want to encrypt the byte ![]()
2.
For this 2-Dimensional example, three points are needed to act as key points.
Here, we have generated the points ![]()
3.
The process of encrypting the data is simply calculating the distance between each key point and data point.
In our example, we calculate: ![]() Decryption
4.
First the key points are set (could be from password or "key file" that was generated and used to encrypt).
The encrypted data is then applied to each key point in the form of a radius:
![]()
5. The intersecting point(s) between each circle is found:
![]()
6.
In our example, the intersection point that occurs the most is ![]() Source for the graphs. |