Loading...
Please wait, while we are loading the content...
Similar Documents
Study and Implementation of Cryptographic Algorithms
| Content Provider | NIT Rourkela |
|---|---|
| Advisor | Patel, Ashish |
| Author | Garg, Ajay Kumar |
| Abstract | Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Often the objectives of information security cannot solely be achieved through mathematical algorithms and protocols alone, but require procedural techniques and abidance of laws to achieve the desired result. For example, privacy of letters is provided by sealed envelopes delivered by an accepted mail service. The physical security of the envelope is, for practical necessity, limited and so laws are enacted which make it a criminal offense to open mail for which one is not authorized. It is sometimes the case that security is achieved not through the information itself but through the physical document recording it. For example, paper currency requires special inks and material to prevent counterfeiting. |
| Related Links | http://ethesis.nitrkl.ac.in/78/ |
| File Format | |
| Language | English |
| Publisher Date | 2008-01-01 |
| Access Restriction | Open |
| Subject Keyword | Cryptography |
| Content Type | Text |
| Educational Degree | Bachelor of Technology (B.Tech.) |
| Resource Type | Thesis |