University : Edith Cowan University

Course Title : CSI6199

Uploaded by : Mark polee

Cyber Security

Table of Contents

Introduction..

Digital Signature Algorithm..

Analysis of Digital Signal Algorithm..

Security Analysis of Digital Security Algorithms.

Alternatives for Digital Signatures.

Conclusion..

References.

Introduction to Contemporary Cyber Security Issues

Cryptography is used to define the process used to protect information and communication data with the help of certain codes such that the data can be encrypted and decrypted by the individuals and organizations alone who hold authority of data. These algorithms can be divided into two categories, symmetric key and asymmetric key cryptography algorithms depending on the nature of key used in the algorithm. Symmetric key algorithms depend on the use of a single key for encryption process and decryption process of the data. Systems based on asymmetric key algorithms make use of a different public key an....

New Here? Get Up to $50 OFFOn Your First Assignment!

Online assignment- Whatsapp Tap to ChatGet instant assignment help

Order Now