Evaluation of Different Encryption Algorithms in • English and Arabic Languages

Ayman Mohamed Diaa El Deen El Tantawy;

Abstract


Cryptography, 1s a powerful tool for achieving high levels of information security in computer networks environment. International Standard Organization (ISO) had proposed five security service groups that include confidentiality, authentication, data integrity, non-repudiation, and access control. Cryptography supports implementation of all these services, through using various cryptographic techniques, which include among other things conventional secret key algorithms, public-key algorithms, authentication procedures, and different digital signature schemes.

Hash functions have a long history in computer science. It was first applied in mapping a large sparsely filled file into a much smaller one. In Cryptography, they are used for authentication procedures, and digital signature applications. Signing a hashed message and not the message itself would achieve:

(i) Prevent the cryptanalyst from restoring plaintext of an encrypted message. (ii) Prevent the attacker from having a valid signature for a forgery message. (iii) Reduce time needed for generating and validating signatures.
(iv) Save storage media required for signed messages.


Other data

Title Evaluation of Different Encryption Algorithms in • English and Arabic Languages
Other Titles تقييم اداء خوارزميات التشفير المختلفة مع التطبيق باللغتين الانجليزية والعربية
Authors Ayman Mohamed Diaa El Deen El Tantawy
Issue Date 2001

Attached Files

File SizeFormat
ايمن محمد ضياء الدين.pdf343.05 kBAdobe PDFView/Open
Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check

views 8 in Shams Scholar


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.