Professional Documents
Culture Documents
Cryptography
Amresh Nikam
Sinhgad Institute of Business Administration
and Research, Pune
Data Theft 34
32
Email Abuse 19
26
Unathorised access 21
16
2002
Data Altretion 17
14 2001
Virus 4
6
Denial of Service 2
4
Other 3
2
0 10 20 30 40
x = random(0 to z)
y = random(0 to 1)
s1 = sy + x
s2 = s(1-y)-x
Where
s is the original sample,
s1 and s2 are share one’s and share two’s sample
x is a random number ranging from 0 to z.
y is a random number ranging from 0 to 1.
z is the maximum number permitted by the audio.