Evaluation of Different Encryption Algorithms in • English and Arabic Languages
Ayman Mohamed Diaa El Deen El Tantawy;
Abstract
Cryptography, 1s a powerful tool for achieving high levels of information security in computer networks environment. International Standard Organization (ISO) had proposed five security service groups that include confidentiality, authentication, data integrity, non-repudiation, and access control. Cryptography supports implementation of all these services, through using various cryptographic techniques, which include among other things conventional secret key algorithms, public-key algorithms, authentication procedures, and different digital signature schemes.
Hash functions have a long history in computer science. It was first applied in mapping a large sparsely filled file into a much smaller one. In Cryptography, they are used for authentication procedures, and digital signature applications. Signing a hashed message and not the message itself would achieve:
(i) Prevent the cryptanalyst from restoring plaintext of an encrypted message. (ii) Prevent the attacker from having a valid signature for a forgery message. (iii) Reduce time needed for generating and validating signatures.
(iv) Save storage media required for signed messages.
Hash functions have a long history in computer science. It was first applied in mapping a large sparsely filled file into a much smaller one. In Cryptography, they are used for authentication procedures, and digital signature applications. Signing a hashed message and not the message itself would achieve:
(i) Prevent the cryptanalyst from restoring plaintext of an encrypted message. (ii) Prevent the attacker from having a valid signature for a forgery message. (iii) Reduce time needed for generating and validating signatures.
(iv) Save storage media required for signed messages.
Other data
| Title | Evaluation of Different Encryption Algorithms in • English and Arabic Languages | Other Titles | تقييم اداء خوارزميات التشفير المختلفة مع التطبيق باللغتين الانجليزية والعربية | Authors | Ayman Mohamed Diaa El Deen El Tantawy | Issue Date | 2001 |
Attached Files
| File | Size | Format | |
|---|---|---|---|
| ايمن محمد ضياء الدين.pdf | 343.05 kB | Adobe PDF | View/Open |
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.