Examples of implementation of asymmetric encryption algorithms
Keywords:
information security, algorithm, electronic digital signature, encryption, decryption, encoding, crypto schemeAbstract
The article deals with cryptographic information security. Showing examples of asymmetric encryption algorithms. Details disclosed technology of electronic digital signatures. It sets out the conditions of asymmetric cryptography. Concrete examples of algorithms that eliminate redundant data recording. Analyzed data compression algorithms, algorithms for backup.