Font Size: a A A

The Design And Research Of A Combined Cryptosystem

Posted on:2006-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:L P LvFull Text:PDF
GTID:2168360152499026Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
With the great development of the computer technology and the Internet evolves into commercial applications, the information technology comes into a new era. More and more organizations and individuals are connecting their internal networks and computers to it and the applications based on the network are utilizing widely. All kinds of information are shared among governments and corporations. But along with the great benefit of Internet comes new threat. The problem on security and complicity of information transmitted through networks is becoming quite a scary proposition for most of us.As the increasing security consciousness and popularization of Internet, various technologies about security are released. Although authentication, access control, encryption and decryption and so on are used widely to protect the resources transmitted through networks. Being the key technology of information security, encryption technology is getting more and more popular. The application of the encryption technology is no longer limited in the fields of military affairs,...
Keywords/Search Tags:information security, encryption and decryption, combined encryption, symmetric encryption, public-key encryption
PDF Full Text Request
Related items