|
These network simulations have three node configurations as follows.
The client node generates random plaintexts and encrypts the plaintexts to transfer to the intermediate node.
The intermediate node operates on the ciphertext received from the client node and sends it to the server node.
Operations consist of simple addition operations and subtraction operations for each character in plain text, and intermediate nodes construct different ways to proceed with each encryption method.
The server node decrypts the ciphertext received from the intermediate node.
|