Download now Free registration required
With the continuous evolution of information technology, security technology will become increasingly important for protecting critical information and enhancing the privacy of Internet users. An increasing number of applications are being connected wirelessly; therefore, the people require protection due to the vulnerability of the wireless link. The core techniques used to maintain security in information technology are cryptographic primitives such as private-key and public-key crypto-algorithms. Private-key algorithms such as AES and triple-DES are usually used to encrypt data, whereas public-key algorithms such as RSA and Elliptic Curve Cryptography (ECC) are used for secure key distribution and digital signatures.
- Format: PDF
- Size: 524.16 KB