Examples of implementation of asymmetric encryption algorithms

Authors

  • М.А. Smirnova
  • I.А. Samoilova
  • L.V. Ustinova

Keywords:

information security, algorithm, electronic digital signature, encryption, decryption, encoding, crypto scheme

Abstract

The article deals with cryptographic information security. Showing examples of asymmetric encryption algorithms. Details disclosed technology of electronic digital signatures. It sets out the conditions of asymmetric cryptography. Concrete examples of algorithms that eliminate redundant data recording. Analyzed data compression algorithms, algorithms for backup.

Downloads

Published

2015-12-29

Issue

Section

MATHEMATICS