A classical introduction to cryptography applications for communications security
The origins of cryptography. Transpositions, substitutions and secret keys. The Shannon theory of secrecy. The data encryption standard. Application of des: Unix passwords. Conventional cryptographic primitives and the advanced encryption standard.
Подобные документы
Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.
книга, добавлен 08.03.2014Программное обеспечение процесса создания на жестком диске компьютера виртуального зашифрованного диска. Возможности утилиты BestCrypt Volume Encryption в шифровании информации. Криптографические технологии, реализованные в BestCrypt Volume Encryption.
статья, добавлен 02.02.2019The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.
статья, добавлен 15.09.2012- 79. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Здійснення ефективного відстеження та аналізу проектів за допомогою програмного продукту Office Project Standard-2007. Створення завдання для розбивки витрат праці за проектом. Функціональні можливості службової програми порівняння версій проекту.
реферат, добавлен 13.07.2017Random generators for cryptographic applications. Evaluation criteria for the principle design. Multiplication in binary extension fields. Time simulations and spectral algorithms. Limits on the maximum clock frequency of pipelined architectures.
учебное пособие, добавлен 08.03.2014The first public key system - Diffie-Hellman key agreement. Solving discrete logarithm problem. Mutual identification with key establishment. Unicity distance for secret key cipher. Statistical tests for random and pseudo-random number generators.
книга, добавлен 08.03.2014Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.
книга, добавлен 08.03.2014Экскурс в историю электронной криптографии. Процесс превращения открытого текста в зашифрованный. Шифрование с секретным ключом. Стандарт Data Encryption Stantart. Способность шифра противостоять всевозможным атакам. Применения криптографических методов.
курсовая работа, добавлен 12.06.2011Standard Template Library как стандартная библиотека шаблонов, состоящая из двух основных частей. Общая характеристика последовательных и ассоциативных контейнеров. Рассмотрение способов определения шаблона Vector c минимальной функциональностью.
лабораторная работа, добавлен 10.08.2013Знакомство с основными типами адаптеров: связыватели для использования функционального объекта с двумя аргументами, отрицатели для инверсии значения предиката. Общая характеристика стандартных обобщенных алгоритмов библиотеки Standard Template Library.
лабораторная работа, добавлен 10.08.2013Methods, tools and applications of Data Mining. Basic concepts of data warehouses and the place of Data Mining in their architecture. The process of data analysis using this technology, its stages. Analytical software market, product data capabilities.
статья, добавлен 30.10.2020Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.
статья, добавлен 17.12.2022The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.
контрольная работа, добавлен 07.08.2017A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.
курс лекций, добавлен 08.03.2014Data warehouse base theory. The description of Extract Transform Load processes. Introduction into OpenStreetMap, base knowledge. Extract Transform Load process planning. Extracting and transformation data. Analysis of the developed data warehouse.
практическая работа, добавлен 13.02.2016Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.
книга, добавлен 08.03.2014Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.
учебное пособие, добавлен 08.03.2014Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.
книга, добавлен 08.03.2014Система управления базами данных Oracle Database Standard Edition (ODSE), ее основные элементы, архитектура баз данных, язык SQL*Plus как инструмент ODSE, особенности наиболее распространенных версий баз для управления данными в сфере среднего бизнеса.
реферат, добавлен 08.10.2016Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
лабораторная работа, добавлен 17.03.2016Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.
книга, добавлен 08.03.2014Error propagation and feedforward invertibility. Generation of finite automata with invertibility. Weak inverses with bounded error propagation of a finite automaton. Canonical form for finite automaton one key cryptosystems. Generalized algorithms.
книга, добавлен 08.03.2014Общая характеристика системы Unix. Бесплатные версии операционных систем семейства Unix. Общие черты Unix-систем. Управление компьютером под управлением Unix. Структура файловой системы. Таблица индексных дескрипторов. Учетные записи пользователей.
презентация, добавлен 05.05.2014Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.
дипломная работа, добавлен 13.07.2020