FUNDAMENTAL OF CRYPTOGRAPHY UP TO RSA
Publish place: Fifth International Conference on Electrical and Computer Engineering with Emphasis on Indigenous Knowledge
Publish Year: 1396
نوع سند: مقاله کنفرانسی
زبان: English
View: 474
This Paper With 5 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
COMCONF05_512
تاریخ نمایه سازی: 21 اردیبهشت 1397
Abstract:
Today, in the digital world protecting the data plays a basic role in exchanging the messages and business exchanges. Encryption is used to supply the security needs of a safe transaction. Given the importance of this subject and passing from a traditional stage to a digital one, familiarity with encryption methods seem to be necessary. Here, in addition to studying the encryption algorithms for asymmetric and symmetric keys, various aspects of asymmetric key will be studied and characteristics of each one will be described.
Keywords:
Authors
Amir Rahimi
Department of computer, Moghadas Ardabili Institute Of Higher Education, Ardabil, Iran