Garg, Ajay Kumar and Patel, Ashish (2008) Study and Implementation of Cryptographic Algorithms. BTech thesis.
| PDF 581Kb |
Abstract
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Often the objectives of information security cannot solely be achieved through mathematical algorithms and protocols alone, but require procedural techniques and abidance of laws to achieve the desired result. For example, privacy of letters is provided by sealed envelopes delivered by an accepted mail service. The physical security of the envelope is, for practical necessity, limited and so laws are enacted which make it a criminal offense to open mail for which one is not authorized. It is sometimes the case that security is achieved not through the information itself but through the physical document recording it. For example, paper currency requires special inks and material to prevent counterfeiting.
Item Type: | Thesis (BTech) |
---|---|
Uncontrolled Keywords: | Number Theory, Public Key |
Subjects: | Engineering and Technology > Electronics and Communication Engineering > Cryptography |
Divisions: | Engineering and Technology > Department of Electronics and Communication Engineering |
ID Code: | 78 |
Deposited By: | Bhupendra Payal |
Deposited On: | 05 May 2009 14:43 |
Last Modified: | 05 May 2009 15:39 |
Supervisor(s): | Rath, G S |
Repository Staff Only: item control page