RSA algorithm

Xem 1-10 trên 10 kết quả RSA algorithm
  • traditional private/secret/single key cryptography uses one key Key is shared by both sender and receiver if the key is disclosed communications are compromised also known as symmetric, both parties are equal hence does not protect sender from receiver forging a message & claiming is sent by sender

    ppt23p muathu_102 28-01-2013 32 2   Download

  • Organizations in both public and private sectors have become increasingly dependent on electronic data processing. Protecting these important data is of utmost concern to the organizations and cryptography is one of the primary ways to do the job.

    pdf15p dunglh2013 02-04-2014 21 0   Download

  • Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement.

    pdf4p dunglh2013 02-04-2014 20 1   Download

  • The paper discusses some public key algorithms such as DH, RSA, DSA, ECDH and ECDSA and also gives mathematical explanations on the working of these algorithms. The paper also gives a brief introduction to modular arithmetic, which is the core arithmetic of almost all public key algorithms.

    pdf14p dunglh2013 02-04-2014 13 1   Download

  • SET for E-commerce Transactions Các giao dịch điện tử an toàn (SET) là một giao thức được thiết kế để bảo vệ các giao dịch thẻ tín dụng qua Internet. Nó là một chuẩn công nghiệp hỗ trợ được thành lập bởi MasterCard và Visa (diễn xuất là cơ quan quản) trong tháng 2 năm 1996. Để thúc đẩy việc tiêu chuẩn SET trong suốt những lời khuyên thanh toán, cộng đồng và hỗ trợ cho sự phát triển của nó đã được cung cấp bởi IBM, GTE, Microsoft, Netscape, RSA, SAIC, Terisa và Verisign.

    pdf51p hoa_thuyvu 13-10-2011 38 7   Download

  • Network Security: Chapter 5 includes about Digital Signatures, Practical Signature Schemes, RSA Signature Scheme, Digital Signature Algorithm (DSA), DSA Key Generation, DSA Signature Creation, istribution of public keys.

    pdf23p cocacola_17 09-12-2015 11 1   Download

  • The advancement of information and communications technology, especially the Internet, has created an opportunity to improve the administrative efficiency and service quality in governments of many nations.

    pdf9p dunglh2013 02-04-2014 21 0   Download

  • The NTRU cryptosystem is a relatively new public key cryptographic algorithm that was first introduced in 1996. The main advantage of this algorithm is that it runs much faster than conventional public key algorithms such as RSA.

    pdf11p dunglh2013 02-04-2014 15 0   Download

  • The security of many cryptographic systems depends upon the generation of unpredictable quantities. Examples include the keystream in the one-time pad (x1.5.4), the secret key in the DES encryption algorithm (x7.4.2), the primes p; q in the RSA encryption (x8.2) and digital signature (x11.3.1) schemes, the private key a in the DSA (x11.5.1), and the challenges used in challenge-response identification systems (x10.3).

    pdf23p vankent 12-07-2010 50 7   Download

  • Abstract Elliptic curve cryptosystems offer security comparable to that of traditional asymmetric cryptosystems, such as those based on the RSA encryption and digital signature algorithms, with smaller keys and computationally more efficient algorithms.

    pdf327p dunglh2013 02-04-2014 18 1   Download


Đồng bộ tài khoản