Hybrid Cryptographic method based on RSA and Paillier algorithm - Tapa blanda

Salim Mohamed, Ghada

 
9783659843549: Hybrid Cryptographic method based on RSA and Paillier algorithm

Sinopsis

Computers are now found in every layer of the society, and information is being communicated and processed automatically on a large scale. So that daily communications of all kinds over the internet have become incredibly popular. Since the rise of the internet, one of the most important factors of information technology and communication has been the security of information. Thus many applications are Internet-based and in some cases, it is desired that the communication be made secret. In essence, the internet is an open channel and security problems such as interception, modification and others are very real. Several approaches have been proposed to make communication via the internet secure. One of these approaches is Cryptography, where the sender uses an encryption key to scramble the message, this scrambled message is transmitted through the insecure public channel, and the reconstruction of the original, unencrypted message is possible only if the receiver has the appropriate decryption key.

"Sinopsis" puede pertenecer a otra edición de este libro.

Reseña del editor

Computers are now found in every layer of the society, and information is being communicated and processed automatically on a large scale. So that daily communications of all kinds over the internet have become incredibly popular. Since the rise of the internet, one of the most important factors of information technology and communication has been the security of information. Thus many applications are Internet-based and in some cases, it is desired that the communication be made secret. In essence, the internet is an open channel and security problems such as interception, modification and others are very real. Several approaches have been proposed to make communication via the internet secure. One of these approaches is Cryptography, where the sender uses an encryption key to scramble the message, this scrambled message is transmitted through the insecure public channel, and the reconstruction of the original, unencrypted message is possible only if the receiver has the appropriate decryption key.

Biografía del autor

Ghada Salim Mohamed is a lecturer in the University of Madenat Al-Elm, have Bachelors degree in computer science/information systems branch, Master degree in computer science/data security branch from the University of Technology/2008, published many researches in the field of cryptography.

"Sobre este título" puede pertenecer a otra edición de este libro.