The reason we select our subject
Application of the math
How to protect data & transmit information safely
in Elgamal cryptosystem
Application of the telecommunication technology
ElGamal Cryptosystem
Public-key cryptosystem
RSA cryptosystem z=pq (p, q: prime, secret key)
ElGamal cryptosystem b=ra (a: secret key)
Elgamal cryptosystem
ElGamal Encryption scheme
Encryption scheme. Czeslaw Koscielny.
Int. J. Appl. Math. comput. Sci. 2004, Vol.14.No.2, 265~267
public-key cryptographic algorithms are designed to resist chosen-plaintext attacks. And their security is based both on the difficulty of finding the secret key from the public key and the difficulty of determining the plaintext from the cryptogram. At present, the most common public-key cryptosys
1. 서론
RFID란, 사물에 부착한 전자 태그(tag)로부터 무선 주파수를 이용하여 정보를 송수신하고, 이와 관련된 서비스를 제공하는 기술로서, 작은 크기로 부착이 용이하고, 정보 송수신이 가능하다는 등의 장점을 지니고 있다. 또한, 앞으로 센서와 칩 소형화 기술이 더욱 발전하면 정보를 능동적으로
Overview
- S-DES encryption algorithm Input : 8-bit block of plaintext(ex:10111101), 10-bit Key Output : 8-bit block of cyphertext
- S-DES decryption algorithm Input : 8-bit block of cyphertext, 10-bit Key(위와 동일한)
Output : 8-bit block of plaintext
- 5개의 function
ㆍ IP : (Initial permutation) 최초로 들어온plaintext에 대한 초기 치환을 수행
ㆍ : key에 의해
Aim
eBay’s mission: to provide a global trading platform where practically anyone can trade practically anything.
More than 94 million people have registered for eBay.
Authority
It has improved its policies and process and people trust it.
It has local sites and it is a profitable online company.
Design
Color scheme
User-friendly format
Various categories
1. Register