The goal of this thesis is to describe principles of public-key cryptography, introduce and compare latest algorithms for asymmetric encryption and point out their advantages over the most popular cryptosystem - RSA. At the beginning, this thesis describes the evolution of public-key cryptography, its differences compared to symmetric-key cryptography and possibilities of using it for data encryption and digital signature. Mathematical background as well as principles of RSA are described afterwards. At the end, this thesis focuses on the latest algorithms on the basis of eliptic curves and their advantages over the most common algorithms are pointed out. The comparison is then summarized and a recommendation for the best cryptosystem is of...
W pierwszej części pracy wprowadzone jest pojęcie systemu kryptograficznego oraz scharakteryzowane s...
The idea of information security lead to the evolution of Cryptography. In other words, Cryptography...
Cryptography defines different methods and technologies used in ensuring communication between two p...
The goal of this thesis is to describe principles of public-key cryptography, introduce and compare ...
The goal of this bachelor thesis is to provide a comprehensive overview of the historical developmen...
Asymmetric cryptography uses two keys for encryption public key and for decryption private key. The ...
This bachelor thesis focuses on the RSA algorithm and it's use in electronic communication. The RSA ...
The aim of this thesis is to explain theoretical and mathematical point of view the principle of ell...
(in English): This thesis describes and compares the most popular algorithms used in information sys...
This thesis brings a reader an overview about historical and modern world of cryptographic methods, ...
Network and Internet applications are growing very fast, since the need to secure these applications...
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to...
Abstract — RSA cryptosystem is the most commonly used public key cryptosystem. It is the first publi...
Abstract: RSA cryptosystem is the most commonly used public key cryptosystem. It is the first public...
BildiriWith the development of technology the amount of information roaming through network is incr...
W pierwszej części pracy wprowadzone jest pojęcie systemu kryptograficznego oraz scharakteryzowane s...
The idea of information security lead to the evolution of Cryptography. In other words, Cryptography...
Cryptography defines different methods and technologies used in ensuring communication between two p...
The goal of this thesis is to describe principles of public-key cryptography, introduce and compare ...
The goal of this bachelor thesis is to provide a comprehensive overview of the historical developmen...
Asymmetric cryptography uses two keys for encryption public key and for decryption private key. The ...
This bachelor thesis focuses on the RSA algorithm and it's use in electronic communication. The RSA ...
The aim of this thesis is to explain theoretical and mathematical point of view the principle of ell...
(in English): This thesis describes and compares the most popular algorithms used in information sys...
This thesis brings a reader an overview about historical and modern world of cryptographic methods, ...
Network and Internet applications are growing very fast, since the need to secure these applications...
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to...
Abstract — RSA cryptosystem is the most commonly used public key cryptosystem. It is the first publi...
Abstract: RSA cryptosystem is the most commonly used public key cryptosystem. It is the first public...
BildiriWith the development of technology the amount of information roaming through network is incr...
W pierwszej części pracy wprowadzone jest pojęcie systemu kryptograficznego oraz scharakteryzowane s...
The idea of information security lead to the evolution of Cryptography. In other words, Cryptography...
Cryptography defines different methods and technologies used in ensuring communication between two p...