University : Edith Cowan University
Course Title : CSI6199
Uploaded by : Mark polee
Table of Contents
Introduction..
Digital Signature Algorithm..
Analysis of Digital Signal Algorithm..
Security Analysis of Digital Security Algorithms.
Alternatives for Digital Signatures.
Conclusion..
References.
Cryptography is used to define the process used to protect information and communication data with the help of certain codes such that the data can be encrypted and decrypted by the individuals and organizations alone who hold authority of data. These algorithms can be divided into two categories, symmetric key and asymmetric key cryptography algorithms depending on the nature of key used in the algorithm. Symmetric key algorithms depend on the use of a single key for encryption process and decryption process of the data. Systems based on asymmetric key algorithms make use of a different public key an....