Reviews
Description
The security of the cryptographic techniques heavily relies on strong encryption and decryption algorithms and increased complexity associated to the algorithms. In this book the plaintext message is converted to the ciphertext message by using both RSA as asymmetric key algorithm and one-time pad as symmetric key algorithm. Three levels of encryption processes are imposed to produce a ciphertext which for sending to the receiver. First, the original message is encrypted by the private key of RSA algorithm of the sender then the output of the first encryption is again encrypted with the public key RSA algorithm of the receiver and finally the output of the second encryption is further encrypted by a shared secret key of one-time pad algorithm. After the above three encryptions a final ciphertext is generated and then sent to the receiver through the communication channels.
EXTRA 10 % discount with code: EXTRA
The promotion ends in 21d.12:08:48
The discount code is valid when purchasing from 10 €. Discounts do not stack.
The security of the cryptographic techniques heavily relies on strong encryption and decryption algorithms and increased complexity associated to the algorithms. In this book the plaintext message is converted to the ciphertext message by using both RSA as asymmetric key algorithm and one-time pad as symmetric key algorithm. Three levels of encryption processes are imposed to produce a ciphertext which for sending to the receiver. First, the original message is encrypted by the private key of RSA algorithm of the sender then the output of the first encryption is again encrypted with the public key RSA algorithm of the receiver and finally the output of the second encryption is further encrypted by a shared secret key of one-time pad algorithm. After the above three encryptions a final ciphertext is generated and then sent to the receiver through the communication channels.
Reviews